Burp Suite for Pentesters – The Installation & Setup
Burp Suite, you might have heard about this great tool and even used it in a number of times in your bug hunting or the penetration testing projects. Though, after writing several articles on...
View ArticleBurp Suite for Pentester – XSS Validator
You might have used a number of online tools to detect XSS vulnerabilities and a few to validate them and thereby, at last, with all the generated outcome you try to exploit the injection pointmanually...
View ArticleBurpsuite for Pentester – Fuzzing via Intruder Tab
Whether it's guessing up a login credential or opting a valid payload for a specific vulnerability, both of these things are time-consuming and require a number of permutation and combination to built...
View ArticleForensic Investigation: Using FTK Imager
FTK Imager is an open-source software by AccessData that is used for creating accurate copies of the original evidence without actually making any changes to it. The Image of the original evidence is...
View ArticleBurpsuite for Pentester – Fuzzing with Intruder (Part 2)
Over in the previous article, we learned about what fuzzing is and how the burpsuite helps us to fuzz a web-application, along with all these things we had even explored some great fuzzing payload...
View ArticleForensic Investigation Using: Volatility Workbench
Volatility Workbench is a GUI version of one of the most popular tool Volatility for analyzing the artifacts from a memory dump. It is available free of cost, open-source, and runs on the Windows...
View ArticleBurp Suite for Pentester – Fuzzing with Intruder (Part 3)
After reading both of our previous articles, you might be wondering, “What about the other features or sections that Burpsuite’s Intruder offers us?” or “How can we use the other payload optionsrather...
View ArticleRelevant –TryHackMe Walkthrough
Today we're going to solve another boot2root challenge called "Relevant". It's available at TryHackMe for penetration testing practice. This lab is not difficult if we have the right basic knowledge to...
View ArticleHA: Vedas Vulnhub Walkthrough
Today we will be cracking this Vulnerable Machine VM Called HA:Vedas. It is a capture-the-flag kind of challenge. It contains four flags based on the four Vedas of Hinduism and all the flags are...
View ArticleStartup TryHackMe Walkthrough
Today we're going to solve another boot2root challenge called "Startup". It's available at TryHackMe for penetration testing practice. This lab is not difficult if we have the right basic knowledge to...
View ArticleInternal TryHackMe Walkthrough
Today we're going to solve another boot2root challenge called "Internal". It's available at TryHackMe for penetration testing practice. This lab is not difficult if we have the right basic knowledge to...
View ArticleHA: Sherlock Vulnhub Walkthrough
Here is the walkthrough of our very own Capture-the-flag, HA: Sherlock which is designed by our team at Hacking Articles.“HA: Sherlock” is a vulnerable machine based on the famous investigator Sherlock...
View ArticleRevenge TryHackMe Walkthrough
Today we're going to solve another boot2root challenge called "Revenge". It's available at TryHackMe for penetration testing practice. This lab is not difficult if we have the right basic knowledge to...
View ArticleThe Server from hell TryHackMe Walkthrough
In this article, we will provide the write-up of the Try Hack Me Room: The Server from hell. This is write-up about a medium level boot to root Linux box which is available for free on TryHackMe for...
View Article0day TryHackMe Walkthrough
Today we're going to solve another boot2root challenge called "0day". It's available at TryHackMe for penetration testing practice. This lab is not difficult if we have the right basic knowledge to...
View ArticleComprehensive Guide on Honeypots
Honeypots are generally hardware or software that are deployed by the security departments of any organization to examine the threats that are possessed by the attackers. Honeypots usually act as baits...
View ArticleAlienVault: Threat Hunting/Network Analysis
What is threat hunting?The process of threat hunting involves proactively searching for malware or attackers that are hiding within a network. Rather than simply relying on security solutions or...
View ArticleDNScat2: Application Layer C&C
In today’s world, IT infrastructure and network security devices are becoming more and more secure and hence, ports like 53 (DNS) are used as a communication channel between a client and a C2 server....
View ArticleComprehensive Guide on XXE Injection
XML is a markup language that is commonly used in web development. It is used for storing and transporting data. So, today in this article, we will learn how an attacker can use this vulnerability to...
View ArticleGhizer TryHackMe Walkthrough
Today we're going to solve another boot2root challenge called "Ghizer". It's available at TryHackMe for penetration testing practice. This lab is not difficult if we have the right basic knowledge to...
View Article