<feed xmlns="http://www.w3.org/2005/Atom"> <id>https://elmehdilaassiri.github.io/</id> <title>Elmehdi Laassiri</title> <subtitle>Pentesting methodology and security research blog.</subtitle> <updated>2026-05-12T15:43:07+02:00</updated> <author> <name>Elmehdi Laassiri</name> <uri>https://elmehdilaassiri.github.io/</uri> </author> <link rel="self" type="application/atom+xml" href="https://elmehdilaassiri.github.io/feed.xml"/> <link rel="alternate" type="text/html" hreflang="en" href="https://elmehdilaassiri.github.io/"/> <generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator> <rights> © 2026 Elmehdi Laassiri </rights> <icon>/assets/img/favicons/favicon.ico</icon> <logo>/assets/img/favicons/favicon-96x96.png</logo> <entry> <title>Webverselabs Gatekeeper Challenge SQLi </title> <link href="https://elmehdilaassiri.github.io/posts/Webverselabs-Gatekeeper-SQLI/" rel="alternate" type="text/html" title="Webverselabs Gatekeeper Challenge SQLi " /> <published>2026-05-12T02:00:00+02:00</published> <updated>2026-05-12T02:00:00+02:00</updated> <id>https://elmehdilaassiri.github.io/posts/Webverselabs-Gatekeeper-SQLI/</id> <content type="text/html" src="https://elmehdilaassiri.github.io/posts/Webverselabs-Gatekeeper-SQLI/" /> <author> <name>Elmehdi Laassiri</name> </author> <category term="Webverselabs" /> <summary>Summary : Gatekeeper Corp presents a web application with a login portal vulnerable to SQL Injection Authentication Bypass. The login form fails to properly sanitize user input, allowing an attacker to manipulate the underlying SQL query and gain unauthorized access without valid credentials. Solution : If we visit the webapp , we find a web page that explains what Gatekeeper corp is , We ...</summary> </entry> <entry> <title>Webverselabs Ember-Kettle Challlenge Reflected-XSS </title> <link href="https://elmehdilaassiri.github.io/posts/Webverse-Labs-Ember-Kettle/" rel="alternate" type="text/html" title="Webverselabs Ember-Kettle Challlenge Reflected-XSS " /> <published>2026-05-12T02:00:00+02:00</published> <updated>2026-05-12T15:40:25+02:00</updated> <id>https://elmehdilaassiri.github.io/posts/Webverse-Labs-Ember-Kettle/</id> <content type="text/html" src="https://elmehdilaassiri.github.io/posts/Webverse-Labs-Ember-Kettle/" /> <author> <name>Elmehdi Laassiri</name> </author> <category term="Webverselabs" /> <summary>Summary : In this challenge we are presented with a web application that we first enumerate as a normal user, mapping out its endpoints and functionality. During enumeration we identify two interesting endpoints — a Newsletter endpoint (POST) and a brew endpoint (GET) with a controllable parameter. After testing the brew endpoint for SQLi and Command Injection with no success, XSS payload...</summary> </entry> <entry> <title>HackSmarter Samurai Walkthrough </title> <link href="https://elmehdilaassiri.github.io/posts/HackSmarter-Samurai-Walkthrough/" rel="alternate" type="text/html" title="HackSmarter Samurai Walkthrough " /> <published>2026-05-10T02:00:00+02:00</published> <updated>2026-05-10T21:40:16+02:00</updated> <id>https://elmehdilaassiri.github.io/posts/HackSmarter-Samurai-Walkthrough/</id> <content type="text/html" src="https://elmehdilaassiri.github.io/posts/HackSmarter-Samurai-Walkthrough/" /> <author> <name>Elmehdi Laassiri</name> </author> <category term="HackSmarter" /> <summary>Summary : In this lab, we start by enumerating the target and discovering that it is running Joomla. Using joomscan, we identify the exact version and find a known unauthenticated information disclosure vulnerability (CVE-51334) that allows us to dump credentials from the database. We use those credentials to log in to the Joomla admin panel and achieve Remote Code Execution by modifying a tem...</summary> </entry> <entry> <title>Web Application Pentesting Methodology </title> <link href="https://elmehdilaassiri.github.io/posts/web-app-pentesting-methodology/" rel="alternate" type="text/html" title="Web Application Pentesting Methodology " /> <published>2026-05-06T02:00:00+02:00</published> <updated>2026-05-12T11:12:50+02:00</updated> <id>https://elmehdilaassiri.github.io/posts/web-app-pentesting-methodology/</id> <content type="text/html" src="https://elmehdilaassiri.github.io/posts/web-app-pentesting-methodology/" /> <author> <name>Elmehdi Laassiri</name> </author> <category term="Methodology &amp; Cheat Sheets" /> <summary>Web Application Pentesting Methodology : Hey everyone! While preparing for CWES and OSWA, i decided to create a brand new methdology specific to Web Apps only , that i can follow and keep on improving . I based it mainly on the CWES path from HTB Academy (very detailed and in-depth), along with notes from The Pentest Book, Web-rta and other web pentesting resources. Structure: → Starts with ...</summary> </entry> <entry> <title>OSCP / CPTS Methodology</title> <link href="https://elmehdilaassiri.github.io/posts/oscp-cpts-methodology/" rel="alternate" type="text/html" title="OSCP / CPTS Methodology" /> <published>2026-04-28T02:00:00+02:00</published> <updated>2026-05-10T23:03:20+02:00</updated> <id>https://elmehdilaassiri.github.io/posts/oscp-cpts-methodology/</id> <content type="text/html" src="https://elmehdilaassiri.github.io/posts/oscp-cpts-methodology/" /> <author> <name>Elmehdi Laassiri</name> </author> <category term="Methodology &amp; Cheat Sheets" /> <summary>Checklist : Linux : Before having access : Do nmap scan . If you dont find a web app , just know the path is an outdated Service . always check versions first , if we find web : Find Directories + subdomains + files . If you find Tomcat , there is a way to Pentest it Down there . check version inside web side found as well . If we find a login page = try Auth bypass via SQL I...</summary> </entry> </feed>
