Bypass Application Whitelisting using Weak Path Rule
Finding loopholes is very important when you are the part of a pen-testing team. Because such loopholes are the source of hacking as the attacker will actively look for them. So in order to patch such...
View ArticleRed Team/Blue Team Practice on Wdigest
In this article, we will show you the methods of protecting your system against MIMIKATZ that fetches password in clear text from wdigest. As you know the Pen-tester and the red team uses mimikatz for...
View ArticlePentest Lab Setup on Memcached
In this article, we are going to learn about pen-testing in Memcached lab setup in Ubuntu 18.04. Memcached server is used by corporations in order to increase the speed of their network as it helps to...
View ArticleHack the Box: Ypuffy Walkthrough
Today we are going to solve another CTF challenge “Ypuffy”. It is a retired vulnerable lab presented by Hack the Box for helping pentester’s to perform online penetration testing according to your...
View ArticleBypass Application Whitelisting using cmstp
By default, Applocker allows the executing of binaries in the folder that is the major reason that it can be bypassed. It has been found that such binaries can easily be used in order to bypass...
View ArticleTrevorC2 – Command and Control
TrevorC2 is command and control framework. It is a client/server model which works through a browser masquerading as C2 tool. It works on different time intervals which makes it almost impossible to be...
View ArticleHack the Box: Dab Walkthrough
Today we are going to solve another CTF challenge “Dab”. It is a retired vulnerable lab presented by Hack the Box for helping pentester’s to perform online penetration testing according to your...
View ArticlePenetration Testing on Memcached Server
In our previous article, we learned how to configure Memcached Server in Ubuntu 18.04 system to design our own pentest lab. Today we will learn multiple ways to exploit Memcached Server. Table of...
View ArticleComprehensive Guide on Snort (Part 1)
This article will introduce a guide to understand IDS using Snort as an example for it. Table of Content : Introduction to IDS Categories of IDS Types of IDS Introduction to Snort Introduction to IDS...
View ArticleHack the Box: Giddy Walkthrough
Today we are going to solve another CTF challenge “Giddy”. It is a retired vulnerable lab presented by Hack the Box for helping pentester’s to perform online penetration testing according to your...
View ArticleHack the Box Zipper: Walkthrough
Today we are going to solve another CTF challenge “Zipper”. It is a retired vulnerable lab presented by Hack the Box for helping pentester’s to perform online penetration testing according to your...
View ArticlePost Exploitation on Saved Password with LaZagne
This article will be focused on The LaZagne project and its usage in Post Exploitation. Table of Content: Introduction of LaZagne Project Syntax and Parameters Achieve Meterpreter and Upload LaZagne...
View ArticleVulnhub: RootThis: 1 Walkthrough
Hello friends! Today we are going to take another boot2root challenge known as root this. The credit for making this VM machine goes to “Fred Wemeijer” and it is another boot2root challenge in which...
View ArticleVulnhub: Kuya: 1 Walkthrough
Today we are going to solve another CTF challenge “Kuya”. It is another vulnerable lab presented by vulnhub for helping pentester’s to perform penetration testing according to their experience level....
View ArticleMatrix 2: Vulnhub Lab Walkthrough
Today we are going to solve another Boot2Root challenge “Matrix 2”. It is another vulnerable lab presented by vulnhub for helping pentester’s to perform penetration testing according to their...
View ArticleW34kn3ss 1: Vulnhub Lab Walkthrough
Today we are going to solve another CTF challenge “W34kn3ss 1”. Briefing about the lab, the matrix is controlling this machine, neo is trying to escape from it and take back the control on it, your...
View ArticleCommix-Command Injection Exploiter (Beginner’s Guide)
In this article, we learn how to use Commix from scratch by using all the basic commands and going all the way to the advanced ones. Table of Content Introduction to command injection Introduction to...
View ArticleWindows Persistence with PowerShell Empire
This is the third article in our empire series, through this we will learn elevated persistence methods. Its trigger method is pretty organised with storage options contained within each module. In...
View ArticleHack the Box Access: Walkthrough
Today we are going to solve another CTF challenge “Access”. It is a retired vulnerable lab presented by Hack the Box for helping pentester’s to perform online penetration testing according to your...
View ArticleReplay: 1: Vulnhub Lab Walkthrough
Hello friends! Today we are going to take another boot2root challenge known as “Replay: 1”. The credit for making this VM machine goes to “c0rruptedb1t” and it is another boot2root challenge in which...
View Article