J3bitokjebitok.hashnode.dev·Oct 31, 2024Exploitation Basics: Blue (TryHackMe)In this article, I will write a write-up for Exploitation Basics: Blue that covers Recons, Gain Access, Escalate, Cracking and Finding Flags. Scan the machine. (If you are unsure how to tackle this, I recommend checking out the Nmap room) How man...Windows
J3bitokjebitok.hashnode.dev·Oct 30, 2024Exploitation Basics: Metasploit: Meterpreter (TryHackMe)In this article, I will write a write-up for Metasploit: Meterpreter that covers the Introduction to Meterpreter, Meterpreter Flavors, Meterpreter Commands, Post-Exploitation with Meterpreter, and Post-Exploitation Challenge. This room is still as ch...Write Up
J3bitokjebitok.hashnode.dev·Oct 28, 2024Exploitation Basics: Introduction (TryHackMe)In this article, I will write a write-up for Metasploit: Introduction that covers the Introduction to Metasploit, Main Components of Metasploit, Msfonsole, and Working with modules. What is the name of the code taking advantage of a flaw on the targ...Exploitation
J3bitokjebitok.hashnode.dev·Oct 28, 2024Exploitation Basics: Moniker Link (CVE-2024-21413)In this article, I will write a write-up for Moniker Link (CVE-2024-21413) that covers the Moniker Link (CVE-2024-21413), Exploitation, Detection, and Remediation. What "Severity" rating has the CVE been assigned? Critical What Moniker Link type do...moniker-link
Rosecurifylog.rosecurify.com·Oct 5, 2024Seclog - #94📚 SecMisc Tools Index | Hackers of India - A comprehensive index of hacking tools. Read More Unleash the Power of Censys Search - A guide for using Censys search effectively. Read More Lambda Watchdog - A monitoring tool for AWS Lambda functions....seclogCVE-2024-45409
theblxckcicadablxckcicada.hashnode.dev·Jul 9, 2024Active Directory Enumeration with MastertulBefore you continue with this blog post, I want to clarify that this content is for educational and ethical purposes only. Do not use these methods on a network you are not authorized to access. Active Directory(AD) enumeration is like exploring a Wi...283 reads#enumeration
Lisa Gomezvission.hashnode.dev·Sep 25, 2023The Role of Governments to Stop Exploitation at WorkIn a democratic country, the government is an instrumental force which can bring new rules and laws for its people. The best part is that it is not that the government is doing this out of goodwill, but it falls under its obligation to look after its...Exploitation
Arshan DabirsiaghiforPixee Blogblog.pixee.ai·Sep 19, 2023Breaking down the Node.js sandbox bypass CVE-2023-30587Turns out, a lot of people want to try to safely run untrusted code, and that's hard. Pixee Engineer Matt Austin (@mattaustin) recently found a bypass of the new and experimental Node.js sandbox in versions before 20.3.1, and it just received a $3K a...2 likes·827 readsSecurity
Fawaz KhosaifanforCD !ROOT Blogscdunroot.hashnode.dev·Sep 18, 2023ExploitationOverview The exploitation phase is the phase where the tester tries to gain access to the system using the vulnerabilities identified in the previous phase. The exploitation phase is important because: It helps to determine the severity of the vulne...Penetration Testing PhasesExploitation
Talsonripp3rdoc.hashnode.dev·Aug 25, 2023SigReturn-Oriented Programming (SROP) Technique — Binary ExploitationReturn-Oriented Programming (ROP) stands as a prominent technique employed in the realm of exploitation, effectively circumventing security mechanisms such as NX/DEP. By delving into the intricacies of the ROP technique, an array of innovative "retur...7 likes·444 readsreturn oriented programming