Forensics Investigation of Ping Command
Introduction:When we say “ping,” we often are just limiting its definition to checking whether a host is alive or not. In my opinion, while this purpose is correct, its technical details are often...
View ArticleMultiple Ways to Persistence on Windows 10 with Metasploit
In this article you will learn the multiple ways to maintain access or create a persistent backdoor with the help of Metasploit Framework on the host machine which you have compromised.Table of...
View ArticleHack the Box- Jarvis Walkthrough
This article is walkthrough for the retired machine “Jarvis” on Hack the Box. This machine has a static IP address of 10.10.10.143. Hack the Box is a website to test your hands on penetration testing...
View ArticleView2aKill: Vulnhub Walkthrough
Today we’ll be sharing another CTF challenge walkthrough. This lab is highly inspired by the James Bond movie- “A View to a Kill.” The lab is made by creosote and hosted on Vulnhub.You can download the...
View ArticleEnuBox: Mattermost: Vulnhub Walkthrough
In this article, we are going to crack the EnuBox: Mattermost Boot to Root Challenge and present a detailed walkthrough. The machine depicted in this Walkthrough is hosted on Vulnhub. Credit for making...
View ArticleBeginners Guide to TShark (Part 1)
In this article, we will learn about TShark which is a well-known network protocol analyzer. It lets us capture the data packets, from the live network. It also allows us, to read or analyze the...
View ArticleMultiple Ways to Crack on WordPress login
In this article, you will be learning how to compromise a WordPress website’s credentials using different brute forcing techniques.Table of Content· Pre-requisites· WPscan·...
View ArticleConnect The Dots:1 Vulnhub Walkthough
Connect The Dots:1 Vulnhub WalkthoughToday we are sharing another CTF walkthrough of the vulnhub machine named “Connect the Dots” with the intent of gaining experience in the world of penetration...
View ArticleSteal Windows Password using FakeLogonScreen
In this article, we are going to focus on a tool that caught my attention. This is a tool that creates a fake Windows Logon Screen and then forces the user to enter the correct credentials and then...
View ArticleHack the Box: Writeup Walkthrough
Today, we're sharing another Hack Challenge Walkthrough box: Writeup and the machine is part of the retired lab, so you can connect to the machine using your HTB VPN and then start to solve the CTF.The...
View ArticleEvil SSDP: Spoofing the SSDP and UPnP Devices
TL; DRSpoof SSDP replies and creates fake UPnP devices to phish for credentials and NetNTLM challenge/response.DisclaimerTable of Content· Introductiono What is SSDP?o What are UPnP...
View ArticleTempus Fugit: 1: Vulnhub Walkthrough
In this article, we are going to crack the Tempus Fugit: 1 Capture the Flag Challenge and present a detailed walkthrough. The machine depicted in this Walkthrough is hosted on Vulnhub. Credit for...
View ArticleHack the Box: Networked Walkthrough
Today, we’re sharing another Hack Challenge Walkthrough box: Networked design by Guly and the machine is part of the retired lab, so you can connect to the machine using your HTB VPN and then start to...
View ArticleBeginners Guide to TShark (Part 2)
In previous article we learned about the basic functionalities of this wonderful tool called TShark. If you haven’t read it until now. Click here.TL; DRIn this part, we will the Statistical...
View ArticleThreat Hunting – A proactive Method to Identify Hidden Threat
According to ISO 27005, a threat is defined as a potential cause of an incident that may cause harm to systems and organization. Software attacks, theft of intellectual property, identity theft,...
View ArticleMultiple Ways to Exploit Windows Systems using Macros
TL; DRIn this article, we will be exploring a total of 6 tools that can craft, encrypt and exploit a Windows Machine using malicious Macros. Table of Content· Introductiono What are Macros?o...
View ArticleBeginners Guide to TShark (Part 3)
This is the third installment in the Beginners Guide to TShark Series. Please find the first and second installments below.· Beginners Guide to TShark (Part 1)· Beginners Guide to...
View ArticleHack the Box: Haystack Walkthrough
Today, we’re sharing another Hack Challenge Walkthrough box: Haystack design by JoyDragon and the machine is part of the retired lab, so you can connect to the machine using your HTB VPN and then start...
View ArticleSar: Vulnhub Walkthrough
Another walkthrough for the vulnhub machine "sar" which is an easy lab designed by the author to give a taste to the OSCP Labs. The challenge is simple just like any other CTF challenge where you...
View ArticleMy File Server- 1: Vulnhub Walkthrough
Another walkthrough for the vulnhub machine “My File Server: 1” which is an easy lab designed by the author to give a taste to the OSCP Labs. The challenge is simple just like any other CTF challenge...
View Article