This repository documents my hands-on learning journey through the Junior Penetration Tester path on TryHackMe.
The focus is on understanding how and why vulnerabilities occur, not just how to exploit them.
Each write-up reflects practical penetration testing concepts, real-world impact, and defensive considerations.
- Introduction to Web Hacking ✅
- Burp Suite ⏳
- Network Security ⏳
- Privilege Escalation ⏳
Write-ups are added as modules are completed.
These labs focus on some of the most common and impactful web application vulnerabilities seen during real penetration tests.
Topic: Broken authentication and logic flaws
Key concepts:
- Missing or inconsistent authentication checks
- Flawed authentication workflows
- Server-side enforcement vs client-side assumptions
📄 Write-up: web-hacking/authentication-bypass.md
Topic: Broken access control / authorization
Key concepts:
- Trusting user-controlled object identifiers
- Authentication vs authorization
- Object-level access control failures
📄 Write-up: web-hacking/idor.md
Topic: Client-side trust and input handling
Key concepts:
- Improper input handling and output encoding
- Context-dependent exploitation
- Real-world browser-based impact
📄 Write-up: web-hacking/intro-to-xss.md
Across these labs, I follow a structured penetration testing mindset:
- Understand application behavior
- Identify user input and trust boundaries
- Test authentication and authorization logic
- Validate impact
- Document findings clearly with remediation guidance
This mirrors how web penetration testing is performed in real consulting and internal security assessments.
- Burp Suite
- Web browser developer tools
- Kali Linux
- TryHackMe vulnerable applications
The goal of this repository is to:
- Build a strong foundation in web application penetration testing
- Practice clear, professional documentation
- Develop a consistent methodology aligned with real-world pentesting
This repository will continue to grow as I progress through additional penetration testing labs and modules.
All testing documented in this repository was performed against intentionally vulnerable systems provided by training platforms.
No unauthorized testing was conducted.
- TryHackMe profile: brotherblond161
- LinkedIn: danebabcock
Dane Babcock 1/12/2026