Jordan Lee

My Cybersecurity Journey

Welcome to my blog where I document my technical journey in Cybersecurity. Search for interesting articles
image

Enumerating a WordPress 4.6 Server: A Beginner’s Guide

Published 2 days ago10 min read8 comments
WordPress is one of the most popular content management systems on the web, but its popularity also makes it a prime target for attackers. Today, we’ll be diving into the basics of enumerating a WordPress 4.6 server – a crucial step in understanding potential vulnerabilities.
Read more →
image

Django CVE-2019-14234: Security Vulnerability Explained and How to Protect Your Application

Published 3 months ago3 min read26 comments
In this post, we dive into Django CVE-2019-14234, a security vulnerability affecting the popular web framework. Learn what this vulnerability is, how it impacts your application, and the steps you can take to secure your Django projects. Whether you’re a developer or a security enthusiast, this guide will help you understand the risks and safeguard your web applications.
Read more →
image

HTTP Brute Forcing with Burp Suite Intruder: A Step-by-Step Guide

Published 2 months ago15 min read3 comments
Brute forcing can reveal weak authentication mechanisms, making it a crucial testing technique in web security. In this post, we explore how to perform HTTP brute forcing using Burp Suite’s Intruder module. Learn the step-by-step process, from configuring attack vectors to analyzing the results, all while staying ethical and within legal boundaries. Perfect for penetration testers and cybersecurity enthusiasts looking to enhance their web application testing skills.
Read more →