Comprehensive Guide on Dirsearch
In this article, we will learn how we can use Dirsearch. It is a simple command line tool designed to brute force directories and files in websites. Which is a Python-based command-line website...
View ArticleTraverxec HacktheBox Walkthrough
Today we’re going to solve another boot2root challenge called “Traverxec“. It’s available at HacktheBox for penetration testing practice. This laboratory is of an easy level, but with adequate basic...
View ArticleForest HackTheBox Walkthrough
Today we're going to solve another boot2root challenge called "Forest". It's available at HackTheBox for penetration testing practice. This laboratory is of a easy level, but with adequate basic...
View ArticleExploiting Stored Cross-Site Scripting at Tenda AC5 AC1200
While testing Tenda AC5 AC1200 over at the Hacking Articles Research Lab, we uncovered several vulnerabilities in its latest firmware version V15.03.06.47_multi.Thereby in a heap of basic...
View ArticleAndroid Pentest: Deep Link Exploitation
Introduction to Deep LinksIn many scenarios an application needs to deal with web based URLs in order to authenticate users using Oauth login, create and transport session IDs and various other test...
View ArticleAdmirer HackTheBox Walkthrough
Today we are going to crack a machine called Admirer. It was created by #########. This is a Capture the Flag type of challenge. This machine is hosted on HackTheBox. Let’s get cracking!Penetration...
View ArticlePort Forwarding and Tunnelling Cheatsheet
In this article, we are going to learn about the concept and techniques of Port forwarding and Tunnelling. This article stands as an absolute cheatsheet on the two concepts.Port forwarding transmits a...
View ArticleThick Client Penetration Testing: Information Gathering
In the previous article, we have discussed about the reverse engineering of original DVTA application in the Lab setup of Thick Client: DVTA part 2In this part, we are going to systematically...
View ArticleBlunder HackTheBox Walkthrough
Today we are going to crack a machine called Admirer. It was created by egotisticalSW. This is a Capture the Flag type of challenge. This machine is hosted on HackTheBox. Let’s get cracking!Penetration...
View ArticleAndroid Penetration Testing: Apk Reverse Engineering
IntroductionAndroid reverse engineering refers to the process of decompiling the APK for the purpose of investigating the source code that is running in the background of an application. An attacker...
View ArticleSwagShop HackTheBox Walkthrough
Today we are going to crack a machine called Admirer. It was created by ch4p. This is a Capture the Flag type of challenge. This machine is hosted on HackTheBox. Let’s get cracking!Penetration Testing...
View ArticleDoctor HackTheBox Walkthrough
Today we're going to solve another boot2root challenge called "Doctor". It's available at HackTheBox for penetration testing practice. This laboratory is of a easy level, but with adequate basic...
View ArticleFuse HackTheBox Walkthrough
Today we are going to crack a machine called Fuse. It was created by egre55. This is a Capture the Flag type of challenge. This machine is hosted on HackTheBox. Let’s get cracking!Penetration Testing...
View ArticleLaCasaDePapel HackTheBox Walkthrough
Today we are going to crack a machine called Fuse. It was created by thek. This is a Capture the Flag type of challenge. This machine is hosted on HackTheBox. Let’s get cracking!Penetration Testing...
View ArticleMagic HackTheBox Walkthrough
Today we are going to crack a machine called magic. It was created by TRX. This is a Capture the Flag type of challenge. This machine is hosted on HackTheBox. Let’s get cracking!Penetration Testing...
View ArticleTraceback HackTheBox Walkthrough
Today we are going to crack a machine called Traceback. It was created by Xh4H. This is a Capture the Flag type of challenge. This machine is hosted on HackTheBox. Let’s get cracking!Penetration...
View ArticleWebDAV Penetration Testing
Hello Pentesters, today, in this article we are going to learn about the concept of WebDAV. We will also see how to set up the Web DAV server and configure a lab for Penetration Testing.Table of...
View ArticleComprehensive Guide on Dirsearch (Part 2)
This is the second installment of our series comprehensive guide on dirsearch. In the first part of this series, we have discussed some basic command on dirsearch. If you haven’t checked the first part...
View ArticleRemote HackTheBox Walkthrough
Today we are going to crack a machine called Remote. It was created by mrb3n. This is a Capture the Flag type of challenge. This machine is hosted on HackTheBox. Let’s get cracking!Penetration Testing...
View ArticleBook HackTheBox Walkthrough
Today we are going to crack a machine called Book. It was created by MrR3boot. This is a Capture the Flag type of challenge. This machine is hosted on HackTheBox. Let’s get cracking!Penetration Testing...
View Article