Passage HackTheBox Walkthrough
Today we are going to crack a machine called the Academy. It was created by egre55 & mrb3n. This is a Capture the Flag type of challenge. This machine is hosted on HackTheBox. Let’s get...
View ArticleThick Client Penetration Testing: Traffic Analysis
Traffic analysis is one of the crucial parts of any successful penetration test. In this article we’re going to discuss some of the different techniques that can be used to analyze thick client...
View ArticleThick Client Penetration Testing on DVTA
In the previous article, we have seen some methods to Analyze the Traffic of Thick Client Applications specifically in DVTA.You can take a look at that article by browsing this link: -...
View ArticleComprehensive Guide to AutoRecon
The AutoRecon tool is designed as a network reconnaissance tool. It is a multi-threaded tool that performs automated enumeration of services. The purpose of this tool is to save time while for cracking...
View ArticleHelp with Java Programming Assignment: Where and How to Get It
Java assignment help is something all students need. It’s not free if it’s high-quality, but you get valuable experience and priceless help during the hardest time. Before getting programming homework...
View ArticleComprehensive Guide on FFUF
In this article, we will learn how we can use ffuf. Where ffuf states for “Fuzz Faster U Fool”, it is an interesting open-source web fuzzing tool.Since its release, many people have gravitated towards...
View ArticleWordlists for Pentester
A Pentester is as good as their tools and when it comes to cracking the password, stressing authentication panels or even a simple directory Bruteforce it all drills down to the wordlists that you use....
View ArticleNax TryHackMe Walkthrough
Today we’re going to solve another boot2root challenge called “Nax “. It’s available at TryHackMe for penetration testing practice. This lab is of medium difficultly if we have the right basic...
View ArticleMnemonic TryHackMe Walkthrough
Today we’re going to solve another boot2root challenge called “Mnemonic “. It’s available at TryHackMe for penetration testing practice. This lab is of medium difficultly if we have the right basic...
View ArticleDogCat TryHackMe Walkthrough
Today we’re going to solve another boot2root challenge called “DogCat “. It’s available at TryHackMe for penetration testing practice. This lab is of medium difficultly if we have the right basic...
View ArticleEncrypted Reverse Shell for Pentester
Reverse shell that are generally used in the wild are prone to sniffing attacks as the communication that happens between the attacker and the victim machine is clear text-based communication. This...
View ArticlePowerShell Empire for Pentester: Mimikatz Module
This article will showcase various attacks and tasks that can be performed on a compromised Windows Machine which is a part of a Domain Controller through PowerShell Empire inbuilt Mimikatz...
View ArticleMetasploit for Pentester: Mimikatz
This article will showcase various attacks and tasks that can be performed on a compromised Windows Machine which is a part of a Domain Controller through Metasploit inbuilt Mimikatz Module which is...
View ArticleTokyo Ghoul TryHackMe Walkthrough
Today we’re going to solve another boot2root challenge called “Tokyo Ghoul “. It’s available at TryHackMe for penetration testing practice. This lab is of medium difficultly if we have the right basic...
View ArticleWireshark For Pentesters: A Beginner’s Guide
What to KnowWireshark is an open-source application and it is the world’s foremost and widely-used network protocol analyzer that lets you see what’s happening on your network at a microscopic level....
View ArticleDomain Persistence: DSRM Attack
In this post, we are going to discuss one more Mitre Attack Technique for Tactic ID TA0003 which is used by various of APTs & threat Actors for creating a permanent backdoor in the domain...
View ArticleTop Choices for Java Coding Practice
To get better at anything you do, you’ll need to do it repeatedly. The same applies to Java programming, and the more you do it, the better you become. It is generally known practice makes perfect....
View ArticleDefenses Evasion: Windows Event Logging (T1562.002)
Defenses Evasion is a cyber kill chain attack strategy that includes strategies used by attackers to prevent detection during their violation.MITRE TACTIC: Defenses Evasion (TA0005)MITRE TECHNIQUE:...
View ArticleActive Directory Enumeration: PoweView
Active Directory Enumeration is a challenge for even some of the seasoned attackers and it is easy to miss some key components and lose the change to elevate that initial foothold that you might...
View ArticleWireshark for Pentester: Password Sniffing
Many people wonder if Wireshark can capture passwords. The answer is undoubtedly yes! Wireshark can capture not only passwords, but any type of data passing through a network – usernames, email...
View Article