Akbar Khanakbarkhan.hashnode.dev·Nov 25, 2024How to Install Docker and Run MobSF for Mobile Security AnalysisThe objective of this document is to provide a comprehensive, step-by-step guide for setting up Mobile Security Framework (MobSF) using Docker. Step 1: Install Docker For Windows: Download Docker Desktop Visit the Docker Desktop download page and dow...1 like·49 readsAndroid
J3bitokjebitok.hashnode.dev·Nov 6, 2024Introduction to Offensive Security (TryHackMe)In this article, I will write a Web Application Security write-up covering Web Application Security Risks and Practical Examples of Web Application Security. What do you need to access a web application? Browser You discovered that the login page a...offensive-security
J3bitokjebitok.hashnode.dev·Nov 3, 2024Offensive Security Tooling: Shells Overview (TryHackMe)In this article, I will write a write-up for Shell Overview that covers Shell Overview, Reverse Shell, Bind Shell, Shell Listeners, Shell Payloads, Web Shell, and a Practical Task. What is the command-line interface that allows users to interact wit...offensive-security
J3bitokjebitok.hashnode.dev·Nov 3, 2024Offensive Security Tooling: Gobuster: The Basics (TryHackMe)In this article, I will write a Gobuster: The Basics that covers Environment and Setup, Gobuster: Introduction, Use Case: Directory and File Enumeration, Use Case: Subdomain Enumeration, and Use Case: Vhost Enumeration. What flag to we use to specif...gobuster
J3bitokjebitok.hashnode.dev·Nov 2, 2024Offensive Security Tooling: Hydra (TryHackMe)In this article, I will write a write-up for Logs Fundamentals that covers Introduction to Logs, Types of Logs, Windows Event Logs Analysis, and Web Server Access Logs Analysis. Start the AttackBox by pressing the Start AttackBox button at the top of...offensive-security
1lrocks1l.rocks·Oct 18, 2024Getting started or finishing the OSCP (PEN-200) courseIntroduction First of all, I’d like to share that I have submitted my exam and the report. From now on, it's just waiting for the results and praying that the results are good. The paranoia is getting there. NOTE: I did receive the certificate :) The...pen200
Yunis Mohamedalbaharyhacks.hashnode.dev·Oct 7, 2024My Journey Into CybersecurityHi, I’m Yunis Mohamed, an aspiring offensive security professional passionate about safeguarding the digital world. My journey into cybersecurity is fueled by curiosity, a commitment to protection, and a belief in our collective role in creating a sa...10 likescybersecurity
Akbar Khanakbarkhan.hashnode.dev·Sep 7, 2024Weaponizing PowerShell: Unleashing the Red Team's Tactical Edge - Part 1PowerShell (PSH) PowerShell is an object-oriented programming language executed from the Dynamic Language Runtime (DLR) in .NET, with some exceptions for legacy uses. It is a powerful tool often leveraged by red teamers for various activities, such a...Powershell
Chioma Ibeakanmachiomaibeakanma.hashnode.dev·Aug 15, 2024Account Takeover via Password Reset (Disclosed Tokens)Account takeover (ATO) vulnerabilities occur when an attacker gains unauthorized access to a user's account. One common vector for ATO vulnerabilities is through the password reset functionality. In this article, we will explore how vulnerabilities c...21 likes·53 readsVulnerabilities with Chioma Ibeakanmapenetration testing
Joao Paulo Guedesth3g3ntl3m4n.hashnode.dev·Jul 14, 2024Baby - VulnlabEnumeration We started executing a full port scan on the host. ╭─[us-free-3]-[10.8.2.220]-[th3g3ntl3m4n@kali]-[~/vulnlab/baby] ╰─ $ sudo nmap -v -sS -Pn -p- 10.10.98.130 --min-rate=300 --max-rate=500 Now, we execute a port scan only on the open por...jpfdevs cybersec