Learning Windows Server Exploitation – Metasploitable 3 Walkthrough
Metasploitable 3 Overview The tutorial demonstrates steps for penetration testing and exploitation of system vulnerabilities. It involves:…
Metasploitable 3 Overview The tutorial demonstrates steps for penetration testing and exploitation of system vulnerabilities. It involves:…
Premise Note: Due to reasons connected to the lab, the credentials of the windows system didn’t appear…
Premise In this video walk-through, we went over the windows box named stack and exploited a Gitstack…
Premise In this video walk-through, we demonstrated the exploitation of a vulnerable Tomcat Web-server to gain initial…
Premise In this video walk-through, we demonstrated how to enumerate and exploit a vulnerable FTP server to…
Premise In this video walkthrough, we went over a Linux lab machine and demonstrated basic application and…
We demonstrated how to do privilege escalation on windows after grabbing plain text credentials in XML files….
In this video Walkthrough, we used one of the lab machines in cyberseclabs that goes by COLD….
Premise In this video walk-through, we demonstrated how to conduct security testing for SQL Databases deployed to…
Premise In this video tutorial, we went over a machine in cyberseclabs that goes by Boats. We…
Premise In this video walkthrough, we went over one of the machines in cyberseclabs that goes by…
Premise In this video walkthrough, we carried on another episode of the penetration testing series by working…
Premise In this video walkthrough, we demonstrated how vulnerable WordPress plugins would lead to a complete system…
Premise In this video walkthrough, I solved a CTF challenge designed to resemble OSCP Lab machines and…
Introduction (this write-up has been sent to google for evaluation and it’s copyrighted, so if you want…
Introduction This challenge write-up was one of the challenges administered by TrendMicro CTF 2017. These challenges require…
This write up is a bit old and contains the solution for both CTF 2013 Backdoor which…
This challenge requires skills both in exploit development, reverse engineering, and writing scripts using python. In this…
Although I could not catch up with the challenges at their time I like to practice the…