TryHackMe — OWASP Top 10 — Security Misconfiguration

--

Security Misconfiguration occurs oftentimes because of human error but what makes it different from the others is that it could be easily avoided most times if the proper measures were taken.

[Severity 6] Security Misconfiguration

Deploy the VM

Hack into the webapp, and find the flag!

A lot of what was read on security misconfiguration spoke about individuals using and keeping default passwords which is a gateway for hackers to access and take control. Multiple attempts to use some commonly used passwords were futile. So I googled the pensive notes, I found a GitHub username and password for the Pensive Notes webapp.

https://github.com/NinjaJc01/PensiveNotes/blob/master/README.md
  • thm{4b9513968fd564a87b28aa1f9d672e17}

--

--

Katjah Smith👩🏽‍💻
System Weakness

I'm here to write about my experiences and all that I am learning while exploring the fascinating world of tech and cybersecurity. Follow my blog.