Printer Driver Exploitation with Metasploit | HackTheBox Driver
We covered a scenario of gaining access to a windows server machine with vulnerable printer software. We…
We covered a scenario of gaining access to a windows server machine with vulnerable printer software. We…
Introduction We covered the second volume of basics and fundamentals of Linux operating system. We covered permissions,…
Introduction We covered a difficult scenario of printer exploitation. We first interacted with the printer HP JetDirect…
Introduction We covered Windows fundamentals and basics such as file system, permissions, directory structure, system configuration, computer…
Introduction We covered basic foundation on internet protocols such as telnet, HTTP, FTP, IMAP, POP3, SMTP and…
Introduction We covered OPSEC which is a US military framework that can be used in the context…
Introduction We covered an introduction to C2 servers. We explained C2 agents, payloads and their types (staged…
Introduction In this post, we covered the first part of passive and active reconnaissance basics and tools….
Introduction In order to better understand what a C2 framework is at its most basic level, think…
In this post, I have covered HackTheBox Cyber Apocalypse CTF 2023 Writeups in the form of written…
Introduction We covered broken authentication and SQL injection walkthrough as part of OWASP Juice Shop from TryHackMe….
Introduction We performed an Nmap scanning to enumerate open ports and we discovered an HTTP service which…
Introduction Microsoft’s Active Directory is the backbone of the corporate world. It simplifies the management of devices…
Summary In this post, we covered Nmap scanning commands and techniques from beginners to advanced. We explained…
Summary In this post, we covered the basic steps to take in order to analyze a binary…
Summary In this video walk-through, we demonstrated gaining root access to a docker container running a web…
Summary In this post, we covered an introduction to docker containers and explained the concept of containerization…
Summary In this post, we covered a CTF challenge involving getting access and compromising a windows machine…
Summary In this post, we covered web application enumeration using FFUF and Gobuster as tools for this…
Pentesting Windows Active Directory with BloodHound | HackTheBox Forest | CREST CRT Track We covered HTB Forest…