>exitvillain_security
exitvillain is a growing network of ethical hackers collaborating on cybersecurity research, red teaming exercises, and security education. We’re not a traditional company—we're a tight-knit, community-driven initiative.
We're also proud to host a public forum for ethical hackers to collaborate, learn, and innovate.
MOBILE VERSION UNDER CONSTRUCTION. But you can still post! might want to Zoom in/out
I will be going to BSides in Adelaide in May 2025. It will be my first time attending a Cybersecurity event and I'm nervous. Do I take a resume? I don't have any experience in a job role in Cybersecurity yet, as I only started studying Cybersecurity in Feb 2023, and got my Cert IV in Cybersecurity through TafeSA in July 2024. Since then I've been studying Ethical Hacking, through Hack The Box, Try Hack Me and then The Cyber Mentor, which introduced me to TCM Academy's Practical Ethical Hacking Course. I've done boxes on Hack The Box, Try Hack Me, and Proving Grounds. I thought I was ready for the PNPT exam. Ha. I'm on my third attempt, and even though I have made way more progress than the first two times, I still feel an idiot. Anyway, any advice for someone going to their first Cybersecurity Event?
the posts section itself is about to be way cooler, stay tuned, got some weird features i kinda think i might be the first to implement well see, also gonna implement video uploading so ill end up putting maybe my second half of the course here. Not to make money, just to build some traffic here.
haha thanks. unfortunately i took it down lol. gonna post the series again but a little more polished lol. Web app security stuff coming, deep dive. get ready. we are finding our first bugs on hacker one together.
So we are going to start by completing all 30 or so Portwisgger labs on XSS. XSS is a great place to start. Let's get really goot at it. So for today, lets do the first four portswigger labs on xss. And then we will complete the first module of the bug bounty job path on hack the box. the first module is easy, it's jsut about curl and a basic things about client / server model and all that stuff. Damn i kinda feel like doing the second module too. Lets do two. So remember, this is our two pronged attack. Hitting web app security from two different angles. HackTheBox AND Portswigger. ANd we can always add more. So remember,
so for the first three xss labs, watch the z3nsh3ll video for each one. And then try to do the lab yourself without looking at the solution. So in my video that i will soon post i might hit a few extra things like I might explain a few thing in even more detail or ya know ill teach something good in it promise. ANd just to prove to you that im keeping up with what i am saying so that we can all hold each other accountable. That i really went through 4 labs at understood them and yada yada yada.So that’s a lot for our first day at this — 4 PortSwigger labs on XSS and the first two modules of the Hack The Box Bug Bounty Job Path. Ya know, just a bit for the first day. We will rev up as time goes by. I can't wait for all of us to make money.
Solid rant haha
Thank you for coming to my sillyforum. more interesting features on the way, and a new daily daily bug bounty study with me let's get our first bug bounty together series
Me again. I have a username and password that crackmapexec states will log me in on smb. But when I try those credentials, I get nowhere. It won't log me in. It doesn't work with smbmap or smbclient. I was able to use enum4linux-ng to see what shares are there, but I can't get on to SMB. I've scoured for credentials and came up empty. There are no more details in the emails either. I've tried this on two machines.
I'm stuck. Again.
K i am about to let you in on the best web app security resource. This guy really teach's web app security well. In my experience, kinda hard to find. Hard to find people who really go into the details, this guy explains it like you are in first grade. Portswigger themselves link to his videos, out of the 269 portwsigger web app security labs i would say z3nsh3ll probably has a walkthrough of a good 100 of them at least. HE GETS INTO IT. do like the 20 XSS labs with z3nsh3ll by your side and you will know more about xss than the average cyber person.
Thanks for that page I will check it out.