Logo Light
  • Tutorials
  • Practice
  • Quizes
  • Blog
  • MCQs
  • Glossary
Logo Light
  • Tutorials
  • Practice
  • Quizes
  • Blog
  • MCQs
  • Glossary
New Exercises
  • Exercise 25: Cloud Instance Metadata Service (IMDS) Bypass
  • Exercise 24: Privilege Escalation via Misconfigured IAM Roles
  • Exercise 23: Cloud API Key Leakage and Exploitation
  • Exercise 22: Cloud-Based Phishing Attack via Fake Cloud Service
  • Exercise 21: Exploiting Misconfigured Cloud Storage Lifecycle Policies
  • Exercise 20: Exploiting Cloud Service Misuse (Zombie Resources)
  • Exercise 19: Cloud Access Logging and Monitoring Exploitation
  • Exercise 18: Insecure Cloud Data Backup Management
  • Exercise 17: Cloud Function Permissions Exploitation
  • Exercise 16: Cloud Network Security Misconfiguration
Network Security Practice Exercise

Exercise 1: Packet Sniffing Basics

Satish Kumar
Jan 01, 2025
Network Security Practice Exercise

Exercise 2: Identifying Suspicious Network Traffic

Satish Kumar
Jan 02, 2025
Network Security Practice Exercise

Exercise 3: Configuring IP Filtering in Firewalls

Satish Kumar
Jan 03, 2025
Network Security Practice Exercise

Exercise 4: ARP Spoofing Simulation

Satish Kumar
Jan 04, 2025
Web Application Security Practice

Exercise 1: SQL Injection (Basic)

Satish Kumar
Jan 05, 2025
Network Security Practice Exercise

Exercise 5: Simulating a Ping Flood (ICMP DoS Attack)

Satish Kumar
Jan 05, 2025
Web Application Security Practice

Exercise 2: SQL Injection (Advanced: Union-Based)

Satish Kumar
Jan 06, 2025
Network Security Practice Exercise

Exercise 6: Exploring Port Scanning with Nmap

Satish Kumar
Jan 06, 2025
Network Security Practice Exercise

Exercise 7: Detecting Network Scans with IDS

Satish Kumar
Jan 07, 2025
Web Application Security Practice

Exercise 3: Cross-Site Scripting (XSS) – Stored XSS

Satish Kumar
Jan 08, 2025
Network Security Practice Exercise

Exercise 8: Configuring NAT and Port Forwarding

Satish Kumar
Jan 08, 2025
Network Security Practice Exercise

Exercise 9: DNS Spoofing with Ettercap

Satish Kumar
Jan 09, 2025
Web Application Security Practice

Exercise 48: Command Injection via Input Fields

  • Satish Kumar
  • June 1, 2025
  • No Comments
Web Application Security Practice

Exercise 47: Broken Cryptography (Insecure Password Storage)

  • Satish Kumar
  • May 31, 2025
  • No Comments
Network Security Practice Exercise

Exercise 50: Exploiting SMB Vulnerabilities (EternalBlue)

  • Satish Kumar
  • May 30, 2025
  • No Comments
Web Application Security Practice

Exercise 46: Cross-Site Scripting (XSS) – DOM-based XSS

  • Satish Kumar
  • May 29, 2025
  • No Comments
PTW Cloud Security Practice

Exercise 25: Cloud Instance Metadata Service (IMDS) Bypass

  • Satish Kumar
  • May 28, 2025
  • No Comments
Web Application Security Practice

Exercise 45: Cross-Site Scripting (XSS) – Reflected XSS

  • Satish Kumar
  • May 28, 2025
  • No Comments
System Security Practice Exercise

Exercise 29: Exploiting Insecure FTP Configurations

  • Satish Kumar
  • May 27, 2025
  • No Comments
Network Security Practice Exercise

Exercise 49: Scanning for Open Ports with Netcat

  • Satish Kumar
  • May 25, 2025
  • No Comments
PTW Cloud Security Practice

Exercise 24: Privilege Escalation via Misconfigured IAM Roles

  • Satish Kumar
  • May 23, 2025
  • No Comments
Web Application Security Practice

Exercise 44: Server Misconfiguration – Exposed Administrative Interfaces

  • Satish Kumar
  • May 23, 2025
  • No Comments
System Security Practice Exercise

Exercise 28: Exploiting Unsecured MySQL Database with Weak Credentials

  • Satish Kumar
  • May 22, 2025
  • No Comments
Network Security Practice Exercise

Exercise 48: Detecting Rogue DHCP Servers

  • Satish Kumar
  • May 20, 2025
  • No Comments
PTW Cloud Security Practice

Exercise 23: Cloud API Key Leakage and Exploitation

  • Satish Kumar
  • May 18, 2025
  • No Comments
Web Application Security Practice

Exercise 43: Cross-Site Scripting (XSS) – Stored XSS

  • Satish Kumar
  • May 18, 2025
  • No Comments
System Security Practice Exercise

Exercise 27: Exploiting Weaknesses in File Permissions with Sudo

  • Satish Kumar
  • May 17, 2025
  • No Comments
Web Application Security Practice

Exercise 42: Sensitive Data Exposure in API Requests

  • Satish Kumar
  • May 16, 2025
  • No Comments
Network Security Practice Exercise

Exercise 47: Configuring a VPN Split Tunnel

  • Satish Kumar
  • May 15, 2025
  • No Comments
Web Application Security Practice

Exercise 41: Improper Input Validation and SQL Injection

  • Satish Kumar
  • May 14, 2025
  • No Comments
PTW Cloud Security Practice

Exercise 22: Cloud-Based Phishing Attack via Fake Cloud Service

  • Satish Kumar
  • May 13, 2025
  • No Comments
System Security Practice Exercise

Exercise 26: Windows Credential Dumping Using Mimikatz

  • Satish Kumar
  • May 12, 2025
  • No Comments
« Previous 1 2 3 … 5 Next »
Logo Light

Privacy Policy

Terms & Conditions

Accessibility

Do Not Sell/Share My Personal Information

Limit the Use of My Sensitive Personal Information

Company

About Us

Contact Us

Careers

Research

Our Research

Deals & Promotions

Password Strength Checker

Password Generator

What’s My Security Score?

Twitter Share
Facebook Share
Linkedin Share

© PentesterWorld.com. All rights reserved.