Logo Light
  • Tutorials
  • Practice
  • Quizes
  • Blog
  • MCQs
  • Glossary
Logo Light
  • Tutorials
  • Practice
  • Quizes
  • Blog
  • MCQs
  • Glossary
New Exercises
  • Exercise 22: Cloud-Based Phishing Attack via Fake Cloud Service
  • Exercise 21: Exploiting Misconfigured Cloud Storage Lifecycle Policies
  • Exercise 20: Exploiting Cloud Service Misuse (Zombie Resources)
  • Exercise 19: Cloud Access Logging and Monitoring Exploitation
  • Exercise 18: Insecure Cloud Data Backup Management
  • Exercise 17: Cloud Function Permissions Exploitation
  • Exercise 16: Cloud Network Security Misconfiguration
  • Exercise 15: Exploiting Insecure Serverless Application APIs
  • Exercise 14: Exploiting Cloud Resource Misallocation
  • Exercise 13: Cloud-Based Credential Stuffing Attack
Network Security Practice Exercise

Exercise 1: Packet Sniffing Basics

Satish Kumar
Jan 01, 2025
Network Security Practice Exercise

Exercise 2: Identifying Suspicious Network Traffic

Satish Kumar
Jan 02, 2025
Network Security Practice Exercise

Exercise 3: Configuring IP Filtering in Firewalls

Satish Kumar
Jan 03, 2025
Network Security Practice Exercise

Exercise 4: ARP Spoofing Simulation

Satish Kumar
Jan 04, 2025
Web Application Security Practice

Exercise 1: SQL Injection (Basic)

Satish Kumar
Jan 05, 2025
Network Security Practice Exercise

Exercise 5: Simulating a Ping Flood (ICMP DoS Attack)

Satish Kumar
Jan 05, 2025
Web Application Security Practice

Exercise 2: SQL Injection (Advanced: Union-Based)

Satish Kumar
Jan 06, 2025
Network Security Practice Exercise

Exercise 6: Exploring Port Scanning with Nmap

Satish Kumar
Jan 06, 2025
Network Security Practice Exercise

Exercise 7: Detecting Network Scans with IDS

Satish Kumar
Jan 07, 2025
Web Application Security Practice

Exercise 3: Cross-Site Scripting (XSS) – Stored XSS

Satish Kumar
Jan 08, 2025
Network Security Practice Exercise

Exercise 8: Configuring NAT and Port Forwarding

Satish Kumar
Jan 08, 2025
Network Security Practice Exercise

Exercise 9: DNS Spoofing with Ettercap

Satish Kumar
Jan 09, 2025
Web Application Security Practice

Exercise 25: Server-Side Request Forgery (SSRF)

  • Satish Kumar
  • March 1, 2025
  • No Comments
Web Application Security Practice

Exercise 24: Cross-Site Request Forgery (CSRF) – Exploiting State-Changing Actions

  • Satish Kumar
  • March 1, 2025
  • No Comments
Network Security Practice Exercise

Exercise 32: Simulating MITM Attacks with SSL Strip

  • Satish Kumar
  • February 28, 2025
  • No Comments
PTW Cloud Security Practice

Exercise 7: Unauthorized Cloud Storage Data Access via Shared Links

  • Satish Kumar
  • February 28, 2025
  • No Comments
System Security Practice Exercise

Exercise 11: Exploiting Weak SSH Configurations

  • Satish Kumar
  • February 27, 2025
  • No Comments
Web Application Security Practice

Exercise 23: Insufficient Logging and Monitoring

  • Satish Kumar
  • February 26, 2025
  • No Comments
Network Security Practice Exercise

Exercise 31: Configuring and Testing VPN Connections

  • Satish Kumar
  • February 25, 2025
  • No Comments
PTW Cloud Security Practice

Exercise 6: Cloud Identity Federation Vulnerability

  • Satish Kumar
  • February 23, 2025
  • No Comments
System Security Practice Exercise

Exercise 10: Exploiting Vulnerable Services (RHEL/CentOS)

  • Satish Kumar
  • February 22, 2025
  • No Comments
Web Application Security Practice

Exercise 22: Insecure Direct Object Reference (IDOR) – File Access

  • Satish Kumar
  • February 21, 2025
  • No Comments
Network Security Practice Exercise

Exercise 30: Testing Wireless Network Security

  • Satish Kumar
  • February 20, 2025
  • No Comments
PTW Cloud Security Practice

Exercise 5: Insecure API Access (API Gateway Vulnerabilities)

  • Satish Kumar
  • February 18, 2025
  • No Comments
System Security Practice Exercise

Exercise 9: Bypassing Restricted Shells

  • Satish Kumar
  • February 17, 2025
  • No Comments
Web Application Security Practice

Exercise 21: Broken Authentication and Session Management

  • Satish Kumar
  • February 16, 2025
  • No Comments
Network Security Practice Exercise

Exercise 29: Monitoring and Mitigating Port Mirroring Misuse

  • Satish Kumar
  • February 15, 2025
  • No Comments
PTW Cloud Security Practice

Exercise 4: Serverless Function Vulnerability (AWS Lambda)

  • Satish Kumar
  • February 13, 2025
  • No Comments
System Security Practice Exercise

Exercise 8: Exploiting Empty User Passwords

  • Satish Kumar
  • February 12, 2025
  • No Comments
Web Application Security Practice

Exercise 20: Remote Code Execution (RCE) via File Upload Vulnerability

  • Satish Kumar
  • February 11, 2025
  • No Comments
Network Security Practice Exercise

Exercise 28: Testing SSL/TLS Configurations

  • Satish Kumar
  • February 10, 2025
  • No Comments
PTW Cloud Security Practice

Exercise 3: Cloud Storage Bucket Encryption Weakness

  • Satish Kumar
  • February 8, 2025
  • No Comments
« Previous 1 2 3 4 5 Next »
Logo Light

Privacy Policy

Terms & Conditions

Accessibility

Do Not Sell/Share My Personal Information

Limit the Use of My Sensitive Personal Information

Company

About Us

Contact Us

Careers

Research

Our Research

Deals & Promotions

Password Strength Checker

Password Generator

What’s My Security Score?

Twitter Share
Facebook Share
Linkedin Share

© PentesterWorld.com. All rights reserved.