Cache HackTheBox Walkthrough
Today we are going to crack a machine called Cache. It was created by ASHacker. This is a Capture the Flag type of challenge. This machine is hosted on HackTheBox. Let’s get cracking!Penetration...
View ArticleOpenKeyS HackTheBox Walkthrough
Today we are going to crack a machine called OpenKeyS. It was created by polarbearer& GibParadox. This is a Capture the Flag type of challenge. This machine is hosted on HackTheBox. Let’s get...
View ArticleAndroid Penetration Testing: APK Reversing (Part 2)
IntroductionAndroid reverse engineering refers to the process of decompiling the APK for the purpose of investigating the source code that is running in the background of an application. In part 1...
View ArticleChaos HackTheBox Walkthrough
Today we're going to solve another boot2root challenge called "Chaos". It's available at HackTheBox for penetration testing practice. This laboratory is of a medium level, but with adequate basic...
View ArticleQuerier HackTheBox Walkthrough
Today we are going to crack a machine called Querier. It was created by mrh4sh& egre55. This is a Capture the Flag type of challenge. This machine is hosted on HackTheBox. Let’s get...
View ArticleSniper HackTheBox Walkthrough
Today we are going to crack a machine called Sniper. It was created by MinatoTWand felamos. This is a Capture the Flag type of challenge. This machine is hosted on HackTheBox. Let’s get...
View ArticleResolute HackTheBox Walkthrough
Today we are going to crack a machine called Resolute. It was created by egre55. This is a Capture the Flag type of challenge. This machine is hosted on HackTheBox. Let’s get cracking! Penetration...
View ArticleSneakyMailer HackTheBox Walkthrough
Today we are going to crack a machine called SneakyMailer. It was created by sulcud. This is a Capture the Flag type of challenge. This machine is hosted on HackTheBox. Let’s get cracking!Penetration...
View ArticleNmap for Pentester: Vulnerability Scan
IntroductionNmap Scripting Engine (NSE) has been one of the most efficient features of Nmap which lets users prepare and share their scripts to automate the numerous tasks that are involved in...
View ArticleAndroid Pentest: Automated Analysis using MobSF
IntroductionMobSF is an open source tool developed by Ajin Abraham that is used for automated analysis of an APK. This is a collection of tools that run under one interface, perform their own...
View ArticleFirefox for Pentester: Hacktool
It's very hard for a bug bounty hunter or a web application pentester to remember all the codes or to search for different payloads by searching it over google. So, what if we can get all the payload...
View ArticleNest HackTheBox Walkthrough
Today we are going to crack a machine called Nest. It was created by VbScrub. This is a Capture the Flag type of challenge. This machine is hosted on HackTheBox. Let’s get cracking!Penetration Testing...
View ArticleWindow Privilege Escalation: Automated Script
In this article, we will shed light on some of the automated scripts that can be used to perform Post Exploitation and Enumeration after getting initial accesses on Windows OS based Devices.Table of...
View ArticleJewel HackTheBox Walkthrough
Today we are going to crack a machine called Jewel. It was created by polarbearer. This is a Capture the Flag type of challenge. This machine is hosted on HackTheBox. Let’s get cracking!Penetration...
View ArticleFile Transfer Cheatsheet: Windows and Linux
While performing penetration testing, you come to a stage where you have already compromised the victim system and are looking for the correct protocols which you can use after exploitation to transfer...
View ArticleLinux Privilege Escalation via Automated Script
In this article, we will shed light on some of the automated scripts that can be used to perform Post Exploitation and Enumeration after getting initial accesses on Linux based Devices.Table of...
View ArticleAcademy HackTheBox Walkthrough
Today we are going to crack a machine called Academy. It was created by egre55 & mrb3n. This is a Capture the Flag type of challenge. This machine is hosted on HackTheBox. Let’s get...
View ArticleSMB Enumeration Guide
We will shine the light on the process or methodology for enumerating SMB services on the Target System/Server in this article. There are numerous tools and methods to perform enumeration, we will be...
View ArticleActive Directory Pentesting: Lab Setup
Today in this article we will be learning how to set up an Active Directory Lab for Penetration Testing. Active Directory is Microsoft’s directory-based identity-related service which has been...
View ArticleWorker HackTheBox Walkthrough
Today we are going to crack a machine called the Worker. It was created by ekenas. This is a Capture the Flag type of challenge. This machine is hosted on HackTheBox. Let’s get cracking!Penetration...
View Article