Inclusiveness: 1: Vulnhub Walkthrough
Another walkthrough for the vulnhub machine “INCLUSIVENESS: 1” which is an Intemediate level lab designed by the author “h4sh5 & Richard Lee” to give a taste to the OSCP Labs. The challenge is same...
View Article2much: 1: Vulnhub Walkthrough
In this article, we are going to crack the 2much: 1 Capture the Flag Challenge and present a detailed walkthrough. The machine depicted in this Walkthrough is hosted on Vulnhub. Credit for making this...
View ArticleMajor Key Components of Threat Hunting
We all know the proactive threat hunting is need hour and as we have already discussed all basic requirement that highlights all generic step required for Threat Hunting Activity in our previous...
View ArticleComprehensive Guide to tcpdump (Part 1)
In this article, we are going to learn about tcpdump. It is a powerful command-line tool for network packet analysis. Tcpdump helps us troubleshoot the network issues as well as help us analyze the...
View ArticleComprehensive Guide to tcpdump (Part 2)
In the previous article of tcpdump, we learned about some basic functionalities of this amazing tool called tcpdump. If you haven’t check until now, click here. Hence, in this part, we will cover some...
View ArticleSahu: Vulnhub Walkthrough
Today we are going to complete a boot2root challenge of the lab Sahu. The lab is developed by Vivek Gautam and can be downloaded from here. Lab us fairly for the beginners and helps to get familiar...
View ArticleMuzzyBox: 1: Vulnhub Walkthrough
IntroductionToday we are going to crack this machine called MuzzyBox. It was created by Muzzy. Duh! This is a Capture the Flag type of challenge. The approach towards solving this machine is a bit...
View ArticleHack the Box: Postman Walkthrough
Today, we’re sharing another Hack Challenge Walkthrough box: POSTMAN design by The Cyber Geek and the machine is part of the retired lab, so you can connect to the machine using your HTB VPN and then...
View ArticleComprehensive Guide to tcpdump (Part 3)
This is the third article in the Comprehensive Guide to tcpdump Series. Please find the first and second articles of the series below.· Comprehensive Guide to tcpdump (Part 1).·...
View ArticleTBBT: FunWithFlags: Vulnhub Walkthrough
IntroductionToday, we are going to complete a Capture The Flag challenge hosted on Vulnhub. This lab is based on a popular CBS series: The Big Bang Theory and as I am a huge fan of this show, it's...
View ArticleHack the Box: Wall Walkthrough
Today we are going to crack a machine called Wall. It was created by aksar. This is a Capture the Flag type of challenge. This machine is hosted on HackTheBox. Let's get cracking!!Penetration Testing...
View ArticleCommand & Control: PoshC2
Table of Content· Introduction· Features· Installation· Enumerate User Information· Enumerate Computer Information· Find All Vulnerabilities·...
View ArticleCredential Dumping: Wireless
Today we will be taking a look at how we can dump Wireless Credentials. We will cover Credential Dumping, Red Teaming, Different ways we can get those pesky wireless credentials.Table of Content·...
View ArticleVulnUni: 1.0.1: Vulnhub Walkthrough
Hello! Everyone and Welcome to yet another CTF challenge from emaragkos, called ‘VulnUni: 1.0.1,’ which is available online on vulnhub for those who want to increase their skills in penetration testing...
View ArticleComprehensive Guide on CryptCat
In this article, we will provide you with some basic functionality of CryptCat and how to get a session from it using this tool.Table of Contents:· Introduction· Chat· Verbose...
View ArticlePersistence: RID Hijacking
In this post, we will be discussed on RID hijacking which is considered as persistence technique in term of cyber kill chain and in this article, you will learn multiple ways to perform RID...
View ArticleCredential Dumping: Credential Manager
In this article we learn about dumping system credentials by exploiting credential manager. We will talk about various methods today which can be used in both internal and external penetration...
View ArticleCredential Dumping: Wdigest
This is our third article in the series of Credential Dumping. In this article, we will manipulate WDigest.dll in or retrieve the system credentials. The methods used in this article are for both...
View ArticleCredential Dumping: Security Support Provider (SSP)
In this article, we will dump the windows log in credentials by exploiting SSP. This is our fourth article in the series of credential dumping. Both local and remote method are used in this article to...
View ArticleCredential Dumping: SAM
In this article, were learn how passwords are stored in windows and out of the methods used to hash passwords in SAM, we will focus on LM and NTLM authentications. And then we learn how to dump these...
View Article