WordPress Pentest Lab Setup in Multiple Ways
In this post, we will demonstrate how to set-up our own WordPress CMS for penetration testing on Ubuntu 20.04, Docker and Windows using XAMPP server.WordPress is a free and open-source content...
View ArticleForensic Investigation: Examining Corrupted File Extension
In this article, we will learn how we can Examining Corrupted File Extension to identify the basic file header in a Forensic Investigation.Let’s Understand this with the following ScenarioIn this...
View ArticleComprehensive Guide to OS Command Injection
Isn’t it great if you get the privilege to run any system commands directly on the target’s server through its hosted web-application? Or you can get the reverse shell with some simple clicks? In this...
View ArticleeLection: 1 Vulnhub Walkthorugh
Today we are going to solve another boot2root challenge called "eLection: 1". It's available at Vulnhub for penetration testing. This is a mid-level lab based on the CMS "eLection". There are several...
View ArticleSunset: decoy Vulnhub Walkthrough
Today we are going to solve another boot2root challenge called "Sunset: decoy". It's available at Vulnhub for penetration testing. This is an easy to intermediate level lab.The credit for making this...
View ArticleCyberSploit: 1 Vulnhub Walkthrough
Today we are going to solve another boot2root challenge called "CyberSploit: 1". It's available at Vulnhub for penetration testing. This is an easy level lab. The credit for making this lab goes to...
View ArticleWordPress Pentest Lab Setup in Multiple Ways
WordPress Pentest Lab Setup in Multiple WaysIn this post, we will demonstrate how to set-up our own Vulnerable WordPress CMS for penetration testing on Ubuntu 20.04, Docker and Windows using XAMPP...
View ArticleComprehensive Guide to Broken Authentication
Does just keeping a secure and a strong password can really protect you? Today in this article we’ll learn, how an attacker analyze and take over the user’s account that have been logged in inside some...
View ArticleWPScan:WordPress Pentesting Framework
Every other web-application on the internet is somewhere or other running over a Content Management System, either they use WordPress, Squarespace, Joomla, or any other in their development phase. So...
View ArticleComprehensive Guide on Netcat
“Whether it is port scanning or to get a reverse shell, everything is possible with Netcat.”Today in this article we will be exploring one of the most commonly used network utility and will learn how...
View ArticleSMTP Pentest Lab Setup in Ubuntu (Port 25)
Wonder, how your email travels from one device to another? Today in this article, we’ll analyze how an SMTP server is responsible for setting up a connection between two different users in order to...
View ArticleForensic Investigation: Ghiro for Image Analysis
In this article, we will learn how we can use the Ghiro image analysis tool in forensic investigation. Ghiro is a digital image forensic tool. Which is fully automated and opensource.Table of content·...
View ArticleComprehensive Guide on Path Traversal
In our previous post, we’ve explained the Local File Inclusion attack in detail, which you can read from here. I recommend, then, to revisit our previous article for better understanding, before going...
View ArticleBlackRose: 1 Vulnhub Walkthrough
Today we are going to solve another boot2root challenge called "BlackRose: 1". It's available at VulnHub for penetration testing, you can download this from here.The credit goes to BadLamerfor...
View ArticlePwned-1: Vulnhub Walkthorugh
Today we are going to solve another boot2root challenge called "Pwned: 1". It's available at Vulnhub for penetration testing. This is an easy level lab.The credit for making this lab goes to Ajs...
View ArticleWindows Persistence: Port Monitors
Adversaries may use port monitors to run an attacker supplied DLL during system boot for persistence or privilege escalation. A port monitor can be set through the AddMonitor API call to set a DLL to...
View ArticleHackTheBox Sauna Walkthrough
Today we are going to solve another boot2root challenge called "Sauna". It's available at HackTheBox for penetration testing. This is an easy level lab.The credit for making this lab goes to...
View ArticleGreenOptic: 1 Vulnhub Walkthrough
Today we are going to solve another boot2root challenge called "GreenOptic - 1". It's available at VulnHub for penetration testing and you can download it from here.The credit for making this lab goes...
View ArticleComprehensive Guide to HTML Injection
“HTML” is considered as the skeleton for every web-application, as it defines up the structure and the complete posture of the hosted content. So have you ever wondered, if this anatomy got ruined up...
View ArticlePresidential: 1 Vulnhub Walkthrough
Today we are going to solve another boot2root challenge called "Presidential - 1". It's available at VulnHub for penetration testing and you can download it from here.The credit for making this lab...
View Article