Richard MarksFollowSystem Weakness--ListenShareThis is a write-up of Devel on Hack The Box without metasploit — it is for my own learning as well as creating a knowledge bank.First I s… Read More
Posted on Oct 14 Before I get to this project known as netcrab, I thought it'd be fun to share some history from Xbox's past... call it the origin story of this tool. Let's… Read More
Sign upSign InSign upSign InÖmer ErdalFollowSystem Weakness--ListenShareHello, everyone! I am here to lead you through a TryHackMe room that I found particularly captivating, titled &ls… Read More
A notorious threat actor with presumed ties to the Chinese government, known as “BlackTech”, has reportedly been exploiting Cisco routers to infiltrate major corporations in the… Read More
IntroAre you a new user of Kali Linux? If so, this guide is for you! This beginner's guide will help you navigate the basics of networking with Kali Linux. We'll cover the fundamentals of se… Read More
Ahmet Talha ŞenFollowSystem Weakness--ListenShareWe are presented with several scenarios, each demonstrating different aspects of XSS attacks. The goal is to find and exploit the XSS vu… Read More
Posted on Sep 3 Here we go again.After building an image modal with CSS only (and completely neglecting accessibility (sorry, @grahamthedev)) and an attempt to establish CSS… Read More
Devon GriffithFollowSystem Weakness--ListenShareDepending on how secure a remote server is, some of the simplest attacks could give you access, like a buffer overflow. Continued…In Pa… Read More
Posted on Aug 14 curl: Command-line tool to transfer data with URLs. Example: curl https://www.example.com (downloads the content of example.com)strace file: Trace system ca… Read More
alda69FollowSystem Weakness--ListenShareThis is my Writeup to the new RED Ctf on TryHackMe. You will learn somthing about LFI, exploiting known vulnerabilities, checking processes and a lot… Read More
Kita sering menjumpai candaan tentang menggunakan Termux sebagai tempat programing. Banyak juga cara menggunakan termux sebagai aplikasi untuk melakukan Pemrograman. tetapi, apakah benar Ter… Read More
Linux Command CheatSheet
Command
Usage
ls
List information about the FILEs (the current directory by default).
cd
Change Directory
cat
Concatenate files and print on the standard output… Read More
Sebelum masuk ke tutorial cara Back Connect atau Reverse Shell terlebih dahulu kalian siapkan bahan-bahan berikut:NetcatNgrokShell Backdoor yang terdapat fitur Back ConnectLangkah… Read More
Egg hunting in 32-bit Windows binary exploitation is a technique used to locate and exploit vulnerabilities in software running on 32-bit versions of the Windows operating system. we are goi… Read More
In this article, we are going to explore the topic of PHAR deserialization php vulnerability that Dawid found in a white box testing. Before we continue, let’s talk about PHAR a little… Read More
As an ethical hacker, it is important to have the right tools at your disposal to conduct your work effectively and efficiently. There are many different hacking tools available, but not all… Read More
In pastejacking attacks, hackers use a malicious program to replace the contents of the user's clipboard with a different set of data, such as a malicious URL, password or other sensitive in… Read More
This Week In FujiNet – 46 and Holiday Week 47
Posted on November 27, 2022 by Atari Orbit
This Week In FujiNet is being released the weekend after Thanksgiving. I… Read More
The post Pivoting to Access Networks in Penetration Testing appeared first on TodayHeadline.
Penetration testing, more commonly known as pen testing, is a security procedure of emulating a… Read More
Kali Linux Tutorial! Learn from the pros how to hack with Kali Linux! Start your ethical hacking journey with Kali LinuxThis course includes:3.5 hours on-demand video6 downloadable resources… Read More
On Windows computers we use various products of Microsoft. For that reason there has a tool called MSDT (Microsoft Support Diagnostic Tool). A cybersecurity researcher "Kevin Beaumont" found… Read More
Hola a tod@s!Recientemente a visto la luz una nueva vulnerabilidad al que le han asignado el CVE-2022-30190 y bautizado con el nombre de Follina por Kevin Beaumont, un conocido investigador… Read More
A veces necesitamos saber si X puerto está abierto en un ordenador (o servidor) remoto, en ese momento tenemos no pocas opciones o herramientas a usar: Índice 1 nmap 2 nc 3 t… Read More
HackTheBox – Jerry Writeup
Today we are gonna solve Jerry from hackthebox.eu. It is a beginner level windows machine released on 30 July 2018
Connecting to HTB Vpn:
First, we have to… Read More
CI/CD pipeline security entails securing everything that passes through your software pipeline, but the pipeline itself might become a target. You can put a halt to it with these CI/CD preca… Read More
HackTheBox – Sense Writeup
Sense is a beginner level FreeBSD machine released on 21 October 2017. The machine resides at 10.10.10.60. It has a webserver running pfsense firewall which… Read More
File transfer cheatsheet for pentesters aims to provide most common ways to send files between machines during engagements .
Hosting Files
Files can be hosted using methods such as web… Read More