Ultimate Guide to eWPT Certification: Training, Exam, Study Tips, Resources and Career Impact

Ilias Mavropoulos
InfoSec Write-ups
Published in
19 min readSep 11, 2024

Table of Contents

  • Section 0: Intro
    0.1 Brief overview of the eWPT
    0.2 Target Audience
  • Section 1: INE Security Training Material (Official Resource)
    1.1 Overview of INE Security Training for eWPT
    1.2 Key Modules and Topics Covered
    1.3 Effectiveness of the Training Material
  • Section 2: Alternative Study Resources
    2.1 Other Training Providers for Web Application Security
    2.2 Online Communities and Forums
  • Section 3: Prerequisites for the Exam
    3.1 Essential Skills and Knowledge
    3.2 Study Timeline and Plan
  • Section 4: The Exam Itself
    4.1 Exam Structure and Format
    4.2 Difficulty Level and Time Management
    4.3 Tips and Strategies for Success
  • Section 5: Realistic Expectations & Career Impact
    5.1 Common Challenges and Pitfalls
    5.2 Industry Recognition and Value of the Certification

Section 0: Intro

0.1 Brief overview of the eWPT

The eWPT (eLearnSecurity Web Application Penetration Tester) certification is a professional-level credential originally offered by eLearnSecurity (now INE Security), aimed at validating the skills and knowledge of individuals in the field of web application security testing. This certification is designed for cybersecurity professionals who specialize in identifying and mitigating vulnerabilities in web applications.

Acquisition requirements:

The eWPT certification requires candidates to score at least 70% on a full hands-on practical exam, where they are required to perform penetration testing on a series of web applications in a controlled environment. The exam tests the candidate’s ability to find and exploit vulnerabilities, analyze security flaws in order to gain unauthorized access to sensitive information to answer 50 final questions.

Note: Information found on the official website for the eWPT are outdated and inaccurately mention that a final report with findings and remediation tips is needed. In order to be certified, candidates are only required to answer 50 questions based on their findings (eWPT version 2)

https://ine.com/learning/certifications/external/elearnsecurity-web-application-penetration-tester

0.2 Target Audience

Penetration Testers, Ethical Hackers, Offensive Security Specialists / Consultants
Professionals who simulate cyberattacks or assess web-based digital systems and technologies to identify and provide meaningful reports for security vulnerabilities.

Security Analysts
Security analysts who monitor and protect a wide and diverse range of digital assets. For these professionals, the eWPT provides specialized knowledge in web application security, allowing them to better understand, identify, and mitigate web-based threats and vulnerabilities.

Web Developers
Web developers who are responsible for designing and building websites and web applications in the first place. By obtaining or studying for the eWPT certification, they can integrate security best practices into their development processes, ensuring that the applications they create are robust against common vulnerabilities from the ground up.

IT Professionals
IT professionals, including system administrators, network engineers, and IT support staff, can benefit from the eWPT certification by gaining a deeper understanding of web application security principles. This knowledge will help them better understand the systems and networks they manage and ensure effective communication with the technical teams of the organization.

Cybersecurity Enthusiasts
Individuals passionate about cybersecurity, whether they are students, hobbyists, or professionals looking to switch careers. The eWPT provides a solid foundation in web application penetration testing and overal web security landscape and opens up opportunities for further specialization and career advancement.

Section 1: INE Security Training Material (Official Resource)

1.1 Overview of INE Security Training for the eWPT

Official Training for the eWPT is offered through the INE Premium subscription and is comprised by the following sections and modules:

eWPT Training Breakdown (12 sections, 73 modules, 58 Labs)

Section 1: Introduction

Section 2: Introduction to Web Application Security Testing

Module 2.1: Introduction
Module 2.2: Introduction to Web Application Security Testing
Module 2.3: Web Application Architecture & Components
Module 2.4: Fundamentals
Module 2.5: Testing Lifecycle
Module 2.6: Conclusion

Section 3: Information Gathering

Module 3.1: Introduction
Module 3.2: Web Enumeration & Information Gathering
Module 3.3: Finding Ownership & IP Addresses
Module 3.4: Reviewing Webserver Metafiles for Information Leakage
Module 3.5: Search Engine Discovery
Module 3.6: Web App Fingerprinting
Module 3.7: Source Code Analysis
Module 3.8: Website Crawling & Spidering
Module 3.9: Web Servers
Module 3.10: DNS Enumeration
Module 3.11: Subdomains
Module 3.12: Web Server Vulnerability Scanning
Module 3.13: File & Directory Enumeration
Module 3.14: Automated Recon Frameworks
Module 3.15: Conclusion

Section 4: Web Proxies

Module 4.1: Introduction
Module 4.2: Web Proxies
Module 4.3: Burp Suite
Module 4.4: OWASP ZAP
Module 4.5: Conclusion

Section 5: Cross-Site Scripting (XSS)

Module 5.1: Introduction to XSS Attacks
Module 5.2: Reflected XSS
Module 5.3: Stored XSS
Module 5.4: DOM-Based XSS
Module 5.5: XSS Tools
Module 5.6: Conclusion

Section 6: SQL Injection

Module 6.1: Introduction
Module 6.2: SQL Injection Fundamentals
Module 6.3: Databases
Module 6.4: SQL Primer
Module 6.5: Finding SQLi Vulnerabilities
Module 6.6: In-Band SQL Injection
Module 6.7: Blind SQL Injection
Module 6.8: NoSQL Injection
Module 6.9: Conclusion

Section 7: Common Attacks

Module 7.1: Introduction
Module 7.2: HTTP
Module 7.3: Sensitive Data Exposure
Module 7.4: Broken Authentication
Module 7.5: Session Security
Module 7.6: CSRF
Module 7.7: Injection & Input Validation
Module 7.8: Security Misconfigurations
Module 7.9: Conclusion

Section 8: File & Resource Attacks

Module 8.1: Introduction
Module 8.2: Arbitrary File Upload Vulnerabilities
Module 8.3: Directory/Path Traversal
Module 8.4: Local File Inclusion (LFI)
Module 8.5: Remote File Inclusion (RFI)
Module 8.6: Conclusion

Section 9: Web Services

Module 9.1: Introduction
Module 9.2: Web Services
Module 9.3: Testing
Module 9.4: Conclusion

Section 10: CMS Pentesting

Module 10.1: Introduction
Module 10.2: Security Testing
Module 10.3: Information Gathering & Enumeration
Module 10.4: Vulnerability Scanning
Module 10.5: Authentication Attacks
Module 10.6: Exploiting Vulnerabilities
Module 10.7: WordPress Blackbox Pentest
Module 10.8: Conclusion

Section 11: Encoding & Filtering

Module 11.1: Introduction
Module 11.2: Encoding
Module 11.3: Filtering
Module 11.4: Evasion
Module 11.5: Conclusion

Section 12: Conclusion

1.3 Effectiveness of the Training Material

Lectures delivered by Alexis Ahmed and the selection of content is designed in a way that explains everything in high detail, ideal for beginners that have no real world experience or prior knowledge in the field of Web Application Security. There were times that I skipped or fast forwarded some theoretical parts or modules but I think those same modules may be crucial for people that do not share the same experience with me, so kudos to Alexis for explaining concepts in detail in order to cover a wide range of student tiers.

Labs and lab solutions were also nicely put together, providing a very good baseline of practical skills needed for the final exam.

Tip: make sure to take very good notes of every Lab early on in the process and maintain all of the lab notes indexed and ready for reference. Personally, I document everything in notion[.]so. There will be similar cases to the labs in the exam and you will probably need to access your notes throughout the examination period, so having all of your labs indexed and ready to go will help you save a lot of time and build confidence during the exam.

Having said that, I want to give you a glimpse on how the training material affected my personal performance in the final exam.

Initially, I went through all the video and lab content, structured my notes and skipped a few videos that felt very introductory or were overlapping some content. After that, I went through my notes again, refined them, made edits so they are more visualized and indexed them properly separating theoretical from practical content and common commands for common concepts.

Tip: when you come by modules that require you to try different payloads or wordlists (like authentication forms brute-forcing but especially on SQL injection or XSS payloads), it is a very good idea not to rely solely on what you were taught or seen in the labs. Research on the web for more payloads and document them, create lists so you can try them quickly during the exam. Also, you can polish your skills and take the time to understand the language behind an injectable field so you can determine the proper “escape” characters that will make your payload eventually work.

So, having laid out all the training content, studied the labs and having a good high level overview of all the content that may show up in the exam, I felt that it would be way easier that I originally was expecting. In other words, I went into my 1st attempt seriously underestimating it, which resulting in me failing the exam with 60% (you need 70% to pass).

My early point here is that the difficulty presented in the training material and labs made me underestimate the exam, while at least for my case, there was more hands-on practice needed to secure a passing score (which was eventually 80% in my 2nd attempt).

Note: eWPT training is part of the INE Premium subscription which also includes valuable courses for a wide range of concepts in Cybersecurity which you may find helpful depending on your level of expertise.

Section 2: Alternative Study Resources

2.1 Other Training Providers for Web Application Security

Besides official INE training, there are several other reputable training providers that offer courses and materials focused on web application security and are suitable to prepare you for the eWPT exam.

These alternative providers cater to different learning styles, price points, and experience levels, so in order to provide relevant information and for an alternative study resource to be feasible for the target group of the eWPT, options like SANS training or OffSec will not be considered.

Here are my top 3 picks:

Bug Bounty Hunter Job Role Path | HTB Academy (hackthebox.com)

1.Hack The Box Job Role Path — Bug Bounty Hunter

I consider this one a great alternative resource for the eWPT exam as it provides a delicate balance between theoretical and hands-on knowledge with box exercises integrated into each learning objective. Don’t get confused by the choice of name of this job role path, in order to be a bug bounty hunter you need to have a very good understanding of web security and web application pentesting in general.

This alternative study resource is also similarly priced to the official INE Security material with an advantage that if you pay for the modules you get to keep access without time restrictions.

Web Security Academy: Free Online Training from PortSwigger

2.Web Security Academy by PortSwigger (Free)

In order to successfully pass the eWPT exam you will most probably have to see the PortSwigger logo in multiple of you hacking dreams. Just like BurpSuite, portswigger will become your best friend. Sign up for the web security academy and complete as many labs as you can (easy tiers) from the relevant concepts examined in the eWPT .

The PortSwigger academy is completely free and it offers fantastic content for the price point.

Practical Web Penetration Tester (PWPT) — TCM Security (tcm-sec.com)

3. TCM Security Academy

TCM Security Academy offers 2 training options for web security training that are very decent and VFM. Practical Web Hacking and API Hacking cover all of the required skills needed to pass the eWPT exam.

2.2 Online Communities and Forums

r/eLearnSecurity (Reddit) — eLearnSecurity (reddit.com)
r/INETraining (Reddit) — INETraining (reddit.com)

The r/eLearnSecurity subreddit is a one of the best (if not the best) online communities dedicated to discussions around eLearnSecurity certifications, including the eWPT.

This subreddit is a great resource for anyone preparing for eLearnSecurity exams, seeking of offering advice, study tips, and shared experiences from fellow learners and certified professionals. With active participation from the community, it provides valuable insights into the certification process, exam strategies, and common challenges.

Unofficial INE/eLearnSecurity/PTA Server (Discord)

The Unofficial INE/eLearnSecurity/PTP Discord server offers a supportive and vibrant community of over 6,000 members. This server covers various certifications of INE and eLearnSecurity, including the eWPT.

Study Rooms and Discussions: The community features study rooms and chats where learners can collaborate in real-time, find study buddies, and share insights about their exam experiences.

Events and Announcements: Regular events, study sessions, and Q&A channels provide opportunities for members to engage with the material and community in an interactive manner.

Resource Sharing: Members frequently share helpful resources, tools, and tutorials in dedicated channels, helping peers to better understand complex web application security aspects and challenges.

Official INE Community Forums

The INE Community Forums serve as a central hub for learners pursuing various INE Learning Paths, including cybersecurity, networking, and cloud certifications. The forum is structured into dedicated categories where members can ask questions, share resources, and connect with peers. Whether you’re stuck on a lab, seeking study partners, or looking for career advice, the forums offer a collaborative space to support your learning journey.

Section 3: Prerequisites for the Exam

3.1 Essential Skills and Knowledge

As mentioned above, Alexis Ahmed does explain everything in depth in case you choose to go with official INE training. In case you choose to go with any other learning path, I personally consider the following areas to be essential for a successful journey:

Basic Networking and Web Technologies
Knowledge of how networks function, including IP addressing, DNS, proxies, and subnetting, can significantly enhance your understanding of web application behavior. Additionally, familiarity with web technologies like HTML, CSS, JavaScript, and server-side languages such as PHP, Python, or SQL is beneficial when identifying and exploiting vulnerabilities.

Understanding Web Application Architectures
A solid grasp of how web applications are built and function is very important. This includes understanding client-server models, HTTP/HTTPS protocols, cookies, sessions, authentication mechanisms, and how front-end and back-end components interact. Knowing the basic structures of web applications will allow you to identify potential vulnerabilities and attack vectors more effectively.

Familiarity with Common Web Vulnerabilities (OWASP Top 10)
General knowledge of common web vulnerabilities is a key requirement. This includes:

  • SQL Injection (SQLi)
  • Cross-Site Scripting (XSS)
  • Cross-Site Request Forgery (CSRF)
  • Broken Authentication and Session Management
  • File Inclusion Vulnerabilities
  • Server-Side Request Forgery (SSRF)

Understanding how these vulnerabilities occur and how to exploit them is vital, as they are a significant focus of the exam.

Tip: while there many resources online, I highly recommend the OWASP top 10 free module offered by APIsec Academy here: OWASP API Security Top 10 and Beyond | APIsec University

Hands-On Experience with Penetration Testing Tools

General hands-on experience with web application penetration testing tools like nmap, Burp Suite, OWASP ZAP, sqlmap, ffuf and nuclei would be a big plus for the exam. These tools are essential for testing and potentially exploiting vulnerabilities. Knowing how to configure and use these tools efficiently will help you navigate the practical parts of the exam.

3.2 Study Timeline and Plan

My own learning journey started somewhere at March 2024 and I tried to devote at least 90 minutes a day at work days and 3 hours at non-working days. There were a few weekends however that I could find myself 6 hours straight into studying and grinding mostly when I was focused on solving and documenting labs.

At this point I want to emphasize the fact that everyone has their own pace, especially when trying to grasp new and relatively complicated concepts. Somewhere at the end of May I underestimated the exam and thought I was ready to give it a go, but I failed it with 60% and this is where I knew I should focus mainly on hands-on practice utilizing the CBBH role path modules from Hack The Box and a few retired boxes.

Recommendation: even if you decide to go with INE training like me, I highly recommend to review web application related boxes at Hack The Box retired section. Read write-ups and polish your hands-on skills so you can secure a passing score at the eWPT exam.

Section 4: The Exam Itself

4.1 Exam Structure and Format

Exam Focus Areas

Source: https://security.ine.com/certifications/ewpt-certification/

The exam evaluates candidates on key areas critical for performing web application penetration testing:

Web Application Penetration Testing Processes and Methodologies (10%)

  • Assessing web applications using industry-standard best practices
  • Identifying vulnerabilities based on the OWASP Web Security Testing Guide

Information Gathering & Reconnaissance (10%)

  • Using OSINT techniques to gather information
  • Extracting details from websites and servers, including domains and IP addresses

Web Application Analysis & Inspection (10%)

  • Identifying web server technologies and potential attack vectors
  • Locating hidden files and directories

Web Application Vulnerability Assessment (15%)

  • Exploiting misconfigurations, weak passwords, and authentication mechanisms

Web Application Security Testing (25%)

  • Exploiting common vulnerabilities such as LFI, RFI, directory traversal, and command injection

Manual Exploitation of Common Web Application Vulnerabilities (20%)

  • Exploiting SQL Injection, XSS, and vulnerabilities in content management systems

Web Service Security Testing (10%)

  • Enumerating and exploiting vulnerable web services

Exam Environment

The exam is conducted in an in-browser lab environment using a pre-configured Kali Linux system. Candidates have access to all necessary tools, scripts, and resources within this environment, including:

  • Metasploit Framework and Exploit-DB (via SearchSploit)
  • Pre-installed tools and wordlists for performing penetration tests

Tip: I highly recommend you to open the exam environment in a Chrome tab. I used MS Edge and learned the hard way.

Other notes:

  • The Kali Linux system is pre-configured with everything needed to complete the exam — no downloads or external installations are necessary.
  • The system is not connected to the internet, but candidates can use their host system for research purposes.
  • Candidates are advised to save their progress locally, as resetting the lab environment will erase all stored data.

Exam Format

  • The exam consists of a series of questions (50 in total) that require candidates to identify and exploit vulnerabilities in the exam environment in order to provide an answer.
  • The exam duration is 10 hours, and candidates are allowed to reset their lab environment, but it will obviously not reset the timer.

Flag-Based and Dynamic Questions

  • Many questions in the exam are flag-based, requiring candidates to find specific flags (text strings like hashes, usernames or other information) that demonstrate successful exploitation.
  • Candidates must enter flags with the exact formatting, maintaining case sensitivity, as specified in the question.

Tip: before resetting the exam environment make sure you have submitted any of the answers for the dynamic questions. I am not really sure about this but they may change after resetting the exam (better be safe than sorry).

Interaction with the Lab

  • The Kali Linux system is accessed via a browser through an RDP connection powered by Apache Guacamole.
  • Candidates can interact with the remote desktop just like a local system, with full mouse and keyboard functionality.
  • Text copying and pasting between the local and remote clipboard is supported through the Guacamole interface.

Tip: you can transfer almost anything you want in the Kali linux system in the exam using the shared clipboard (eg. copy-paste source code of a tool).

4.2 Difficulty Level and Time Management

When getting into a network and discovering multiple web applications (as it happens in the eWPT exam) it is not very difficult to engage in overthinking, lose time in rabbit holes of endless fuzzing with different wordlists, miss a vulnerable field, a running service or a crucial vulnerability. In the real world you would rarely (if not never) be given 10 hours to properly assess one web application (let alone multiple web apps).

As I mentioned earlier in my review, I underestimated the exam, went into my 1st attempt early and though I scored near to 70%, I ended up failing.

Does this mean the exam is difficult?

Probably no.

Personal (casual) research I’ve conducted on LinkedIn, Medium, Reddit and Discord suggests that the eWPT is a considered a medium-difficulty (intermediate) certification by the Cybersecurity community, something that can also be confirmed by the well known “Security Certifications Roadmap” here:

Security Certification Roadmap — Paul Jerimy Media

Having set objective expectations for the difficulty of the exam, let’s proceed to time management tips.

Don’t waste time in repeated recon scans or fuzzing

I’m not sure about you but I’ve been victim of running the same scans on Nmap and Nuclei, or repeating fuzzing just because my output was buried somewhere in the cli.

Tip: be methodical and document every tool output separately in your notes (Cherry tree, notion or any other note taking tool you use). Alternatively, you can open multiple terminal tabs and rename them accordingly so you can have your shells organized and ready to revisit.

Tip: use information from the questions to orchestrate your scans and don’t proceed with running scans to every single IP you may find through the discovery phase.

Get done with the easy questions first

Landing in an exam environment with 50 questions based on practical exploration and exploitation of a black box environment can be scary at first sight.

Try to establish some “easy wins” and work on the easy questions first by skipping (and flagging for review) questions that you consider you would have a difficult time answering. Trust me, there will be questions that you would feel confident to answer and other ones that you could tell they require more effort.

Document EVERYTHING

Make sure you maintain great documentation of everything you discover or exploit (initial access methods, effective payloads, credentials etc.) not because you will be required to create a report (the report does not apply to the eWPT v2) but because it will help you tremendously in your potential 2nd attempt to the exam environment in case you fail your first one.

Hopefully helpful: documentation is also a critical skill that is massively overlooked in the field, or considered not so “sexy” as hacking but it’s the one skill that will make you stand out in the field, get you a raise or a better position in the company. Even if you don’t like it, utilize it to pass the exam. Your desire to pass, may cause the side-effect of you upgrading your documentation skills.

4.3 Tips and Strategies for Success

I will start by saying that the ultimate success of training and certifications like this one, is to get you to really learn about web security, develop a strategy and methodology in testing and acquire technical skills that will make you competitive in the field.

Having said that, I mostly see 2 pathways for candidates aiming for certifications like this one and in general:

  • Study to “pass the exam”
  • Study to “truly grasp the skills” and the certification will come as a “side-effect”

Tips to “pass the exam”

By reading all the questions of the exam you can extract valuable information about the black box environment like endpoints, usernames, technologies etc. You can definitely use these information to narrow down scans, brute forcing or literally any of your efforts. You can even make more informative decisions by eliminating answer options in case you have an unanswered question and you want to choose a random answer for submission.

This is obviously not possible in the majority of questions but it could give you that 5% boost you need for a passing score if you’re close anyway.

Tips to “truly grasp the skills”

Forget about the rat race, comparing you with others that seem to progress quickly in Cybersecurity gaining one certification after another. I have met people with literally no certifications doing all the great work or building amazing tools for the community because they either wouldn’t care about “assessing” themselves or they wouldn’t happen to pass by companies sponsoring the certifications.

I’ve also met managers complaining about employees with all the expert certifications not producing subpar work or seeming to care a lot or enjoy working in security testing.

So, what should you think about people with or without certifications?

Nothing. Everyone has their own story.
Having certifications is like compliance which may or may not be equal to true security.

Having said all of that, let’s get back to the tips for “grasping the knowledge”:

  • Read along all the training material so you can have an idea of the “knowledge surface”
  • Focus on solving labs step by step and create your personal notes with useful commands and anything other useful to your
  • Utilize platforms like hack the box and Try hack me, play related rooms to the concepts taught in the eWPT, play retired or even live boxes related to web application pentesting, read write-ups
  • Utilize PortSwigger academy to gain hands-on skills with Burp Suite which either way will be your best friend in your career
  • In general, devote a significant time in playing boxes so you can develop “muscle memory” with the command line

Tip: do not neglect OWASP ZAP just because “you’re gonna use Burp”. Spend some time with it. You may find it helpful since it does not have rate limiting like the community edition of BS.

Section 5: Realistic Expectations & Career Impact

5.1 Common Challenges and Pitfalls

As discussed previously in [Tips to “truly grasp the skills”], achieving any certification may check some compliance boxes but will definitely not ensure any company that you are really ready for the job.

Passing the eWPT doesn’t mean instant mastery. Like any technical certification, it’s part of a larger learning journey. Candidates will need to continue refining their skills and learning about evolving web technologies and threats. The eWPT provides just a foundation while it demonstrates that you have acquired baseline skills and experience, that combined with company-specific training can enable you to work as a web application penetration tester.

This credential can also help you stand out when applying for jobs in cybersecurity roles, such as Penetration Tester, Web Application Security Analyst, Security Consultant etc. Also, keep in mind that many employers, especially in the tech industry, value hands-on certifications like the eWPT for roles focused on offensive security.

5.2 Industry Recognition and Value of the Certification

Industry Recognition

Through casual research on LinkedIn I have found the eWPT to be
recognized within the cybersecurity community as a rigorous and respected certification. It helps build credibility, showing that you have a good understanding of web application vulnerabilities and can handle real-world penetration testing scenarios.

I’ve also noticed respected companies in the field providing this training and certification to their employees which, combined with my personal experience, makes me assume it is worth the time and investment (if you’re paying out of your pocket for this).

Increased Earning Potential

When you gain specialized certifications in cybersecurity, especially in areas like offensive security, it is possible to pursue higher salaries in the field. The certification signals to employers that you can add value by protecting their web assets, making you a more valuable candidate, and just like “compliance boxes” having certifications will enable employers to advertise this fact to potential customers when providing pentesting quotes.

Consider this sales flow: employers can “sell” a pentesting service more expensive depending on the certifications of their pentesters. This is why there are companies that will sponsor certifications to employees. Besides the fact that their service will become better and more competitive, there will also be a direct earning from a potentially higher priced service.

Career Progression

The eWPT can also serve as a stepping stone toward more advanced certifications and roles. After gaining practical experience and expanding your skill set, you may pursue higher-level certifications like the eWPTX. OSWE (Offensive Security Web Expert) or CREST Web Application Tester. As you gain experience, roles such as Senior Penetration Tester or Security Architect become attainable.

Hint: career progression is where the strategy to “study for grasping the knowledge” really becomes important. Having all the expert certifications of the field will not guarantee you progressing through interviews with highly technical individuals for senior positions.

Conclusion

The eWPT certification is a powerful credential for anyone looking to either specialize in web application penetration testing or enhance their skills in general pentesting. From the thorough INE training material to the practical exam experience, it offers candidates a valuable and rewarding journey and it serves as a milestone on the path to becoming a skilled penetration tester.

Achieving the eWPT can definitely open doors to advanced career opportunities, higher earning potential, and respected industry recognition.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

Published in InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

No responses yet

Write a response