Category: Hands-On Labs
-
Executing Brute Force Attacks with Hydra

This post is part of my portfolio, where I document my practical experience in cybersecurity. In this article, I will show how to execute a brute force attack using Hydra on a web application, specifically DVWA (Damn Vulnerable Web Application), within a controlled environment. 👨💻 Why I Studied Brute Force Attacks Understanding brute force attacks…
-
How to Conduct a Brute Force Attack on DVWA

As part of my cybersecurity portfolio, I am conducting a brute force test in a controlled environment using Kali Linux, Burp Suite, and DVWA (Damn Vulnerable Web Application). The goal is to show how these tools can be used to identify vulnerabilities in web applications and showcase my penetration testing skills. Setting Up the Environment…
-
Exploring bWAPP Vulnerabilities Using Kali Linux Tools

Recently, I decided to set up a security testing environment using Kali Linux and bWAPP (BeeBox). I thought this would be a great opportunity to practice some penetration techniques. To ensure my security during the process, I used a VPN alongside a NAT configuration. What is the bWAPP Bee Box? bWAPP (Buggy Web Application) is…
