Born2Root: 2: Vulnhub Walkthrough
Hello Friends!! Today we are going to take another CTF challenge named “Born2Root: 2”. The credit for making this VM machine goes to “Hadi Mene”. It is available on the Vulnhub website. Although there...
View ArticleGet Meterpreter Session Alert over slack
You’re going to learn ShellHerder in this post. It is a technique used to monitor all the sessions of Metasploit/Meterpreter. The basic idea to create it, that new incoming sessions could be easily...
View ArticleDC-4 Vulnhub Walkthrough
Today we are going to take another boot2root challenge known as “DC-4”. The credit for making this VM machine goes to “DCAU” and it is another boot2root challenge in which our goal is to get root...
View ArticleDevelopment: Vulnhub Walkthrough
Today we are going to take on another challenge known as “DEVELOPMENT”. This is designed for OSCP practice, and the original version of the machine was used for a CTF. It is now revived and made...
View ArticleSputnik 1: Vulnhub Walkthrough
Today we will be solving a boot2root lab from Vulnhub called Sputnick:1. This lab, like many others, is a good way to keep your penetration testing skills sharp while getting some variety. Level: Easy...
View ArticleSilky-CTF: 0x01: Vulnhub Walkthrough
Today we will be solving a boot2root lab from Vulnhub called SILKY-1. This lab, like many others, is a good way to keep your penetration testing skills sharp while getting some variety. Download it...
View Articleunknowndevice64 v2.0: Vulnhub Walkthrough
Today we are going to take on another boot2root challenge “uknowndevice64 v2.0” by Ajay Verma. Our goal is to get root and read flag.txt with at least two different ways. Download it from here:...
View Articledigitalworld.local-BRAVERY: Vulnhub Walkthrough
Today we will be solving a boot2root lab from Vulnhub called Bravery. This lab, like many others, is a good way to keep your penetration testing skills sharp while getting some variety. Download it...
View ArticleLightweight: Hack the Box Walkthrough
Today we are going to solve another CTF challenge “lightweight”. It is a retired vulnerable lab presented by Hack the Box for helping pentesters to perform online penetration testing according to your...
View ArticleData Exfiltration using PowerShell Empire
In our previous post, we had already discussed “Command and Control with DropboxC2” But we are going to demonstrate Data Exfiltration by using PowerShell Empire where we will extract the unauthorized...
View ArticleDC-5 Vulnhub Walkthrough
Today we are going to take another boot2root challenge known as “DC-5”. The credit for making this VM machine goes to “DCAU” and it is another boot2root challenge in which our goal is to get root...
View ArticleLinux for Pentester: APT Privilege Escalation
In this article, we’ll talk about APT (apt-get) functionality and learn how helpful the apt command is for Linux penetration testing and how we’ll progress apt to scale the greater privilege shell....
View ArticleLinux for Pentester : ZIP Privilege Escalation
Today We are going to tell you that how can we perform Privilege Escalation with Zip command. As we all know that Zip is an easy platform-based file packaging and compression utilities for Unix-like...
View ArticleEvilginx2- Advanced Phishing Attack Framework
This is the successor of Evilginx 1, and it stays in-line with the MITM lineage. This tool is designed for a Phishing attack to capture login credentials and a session cookie. Table of Content...
View ArticlePenetration Testing on Splunk
In this article, we are going to exploit SPLUNK using the reverse shell. One can find this beneficial in exploiting and do penetration testing of SPLUNK environment of their respective IT...
View ArticleLinux for Pentester: Wget Privilege Escalation
In this article, we are going to describe the entire utility of Wget command and how vital it is in Linux penetration testing. As Wget is used for downloading the files from the server so here we will...
View ArticleCloakify-Factory: A Data Exfiltration Tool Uses Text-Based Steganography
In our previous post, we had already discussed on “Cloud Storage Uploads for data exfiltration” and today we are going to discussed “Concealed Method for Data Exfiltration” to extract the unauthorized...
View ArticleLinux for Pentester: Find Privilege Escalation
Today in this article we are back with another most advantageous command from the series of Linux for Pentester i.e. “Find’. The Find command is used to search the list of files and directories, so by...
View ArticleLinux for Pentester: CAT Privilege Escalation
Today we are going to talk about CAT command and learn how helpful the cat command is for Linux penetration testing and how we’ll progress cat to scale the greater privilege shell. Table of Content...
View ArticleLinux for Pentester: xxd Privilege Escalation
In this article, we are going to make our readers familiar with another influential command i.e. “xxd” which assist for converting any hex dump to a binary and vice-versa. So, by knowing this certainty...
View Article