Hack the Box: Giddy Walkthrough
Today we are going to solve another CTF challenge “Giddy”. It is a retired vulnerable lab presented by Hack the Box for helping pentester’s to perform online penetration testing according to your...
View ArticleHack the Box Zipper: Walkthorugh
Today we are going to solve another CTF challenge “Zipper”. It is a retired vulnerable lab presented by Hack the Box for helping pentester’s to perform online penetration testing according to your...
View ArticlePost Exploitation on Saved Password with LaZagne
This article will be focused on The LaZagne project and its usage in Post Exploitation.Table of Content:· Introduction of LaZagne Project· Syntax and Parameters· Achieve...
View ArticleVulnhub: RootThis: 1 Walkthrough
Hello friends! Today we are going to take another boot2root challenge known as RootThis. The credit for making this VM machine goes to “Fred Wemeijer” and it is another boot2root challenge in which our...
View ArticleVulnhub: Kuya: 1 Walkthrough
Today we are going to solve another CTF challenge “Kuya”. It is another vulnerable lab presented by vulnhub for helping pentester’s to perform penetration testing according to their experience...
View ArticleMatrix 2: Vulnhub Lab Walkthrough
Today we are going to solve another Boot2Root challenge “Matrix 2”. It is another vulnerable lab presented by vulnhub for helping pentester’s to perform penetration testing according to their...
View ArticleW34kn3ss 1: Vulnhub Lab Walkthrough
Today we are going to solve another CTF challenge “W34kn3ss 1”. Briefing about the lab, the matrix is controlling this machine, neo is trying to escape from it and take back the control on it, your...
View ArticleCommix-Command Injection Exploiter (Beginner’s Guide)
Commix-Command Injection Exploiter (Beginner’s Guide)In this article, we learn how to use Commix from scratch by using all the basic commands and going all the way to the advance ones. Table of Content...
View ArticleGenerate Metasploit Payload with Ps1encode
Generate Metasploit Payload with Ps1encodeIn this article, we will learn Ps1Encode tool and how to use it by generating malwares in different file formats such as HTA, EXE, etc.IntroductionThe working...
View ArticleWindows Persistence with PowerShell Empire
This is the third article in our empire series, through this we will learn elevated persistence methods. Its trigger method is pretty organised with storage options contained within each module.In...
View ArticleHack the Box Access: Walkthrough
Today we are going to solve another CTF challenge “Access”. It is a retired vulnerable lab presented by Hack the Box for helping pentester’s to perform online penetration testing according to your...
View ArticleReplay: 1: Vulnhub Lab Walkthrough
Hello friends! Today we are going to take another boot2root challenge known as “Replay: 1”. The credit for making this VM machine goes to “c0rruptedb1t” and it is another boot2root challenge in which...
View ArticleHiding IP During Pentest using Empire (http_hop)
This is our fourth article in empire series, in this article we learn to use hop payload in PowerShell empire. Empire has an inbuilt listener named http_hop which allows us to redirect our traffic to...
View ArticleDC-1: Vulnhub Walkthrough
Hello friends! Today we are going to take another boot2root challenge known as “DC-1: 1”. The credit for making this VM machine goes to “DCAU” and it is another boot2root challenge in which our goal is...
View ArticleCasino Royale: 1 Vulnhub Walkthrough
Today we are going to solve another CTF challenge “Casino Royale: 1”. It is a vulnerable lab presented by author creosote for helping pentesters to perform online penetration testing according to your...
View Articlenps_payload: An Application Whitelisting Bypass Tool
In this article we will create payloads using a tool named nps_payload and get meterpreter sessions using those payloads. This tool is written by Larry Spohn and Ben Mauch. Find this tool on...
View ArticleBypass User Access Control using Empire
Bypass User Access Control using EmpireThis is fifth article in our empire series, for the basic guide to empire click here. In this article, we will learn to bypass administrator privileges using...
View Articleunknowndevice64 1: Vulnhub Lab Walkthrough
Hello friends! Today we are going to take another boot2root challenge known as “unknowndevice64: 1”. The credit for making this VM machine goes to “Ajay Verma” and it is another boot2root challenge in...
View ArticleCommand and Control Guide to Merlin
In this article, we learn how to use Merlin C2 tool. It is developed by Russel Van Tuyl in Go language. Table of content:IntroductionInstallationWindows exploitationWindows post exploitationLinux...
View ArticleHackInOS:1: Vulnhub Lab Walkthrough
Hello friends! Today we are going to take another boot2root challenge known as “HackInOS: 1”. The credit for making this VM machine goes to “Fatih Çelik” and it is another boot2root challenge in which...
View Article