Taditadisec.com·Nov 20, 2023How I Studied For The OSWEToday, I'm bringing you a mostly unscripted, chill review of my journey through the OSWE (Offensive Security Web Expert) certification. No need to strap in, because this will not be a long one - I'm just rolling off the dome, sharing my experiences a...Discuss·597 readsBlogOSWE
Pradip Deyp3ntesterinstanc3.hashnode.dev·Sep 24, 2023Format HTB Walkthrough/WriteupThe “Format” machine is created by coopertim13. This is a medium HTB machine with a strong emphasis on Redis usage and the orchestration of chained attacks. Enumeration Using Nmap nmap -sC -sV -O 10.10.11.213 -A -T4 --min-rate=1000 Nmap scan report ...Discuss·1 like·171 readsoffensive-security
Pradip Deyp3ntesterinstanc3.hashnode.dev·Sep 17, 2023CozyHosting HTB Writeup/WalkthroughThe “CozyHosting” machine is created by “commandercool”. This is an easy machine with a strong focus on web application security vulnerabilities which enables us to get the reverse shell of the machine. So, let’s start… Enumeration Using Nmap nmap -s...Discuss·1 like·524 readshtb-academy
Akbar KhanforBreachForcebreachforce.net·Sep 10, 2023Google DorkingWhat is a Google Dork? Google Dorking is also known as “Google hacking.” Google Dorking or Google hacking refers to using Google search techniques to hack into vulnerable sites or search for information that is not available in public search results....Discuss·1 likereconnaissance
Rushikesh PatilforBreachForcebreachforce.net·Sep 9, 2023Cracking the TGT: A Deep Dive into Kerberoasting AttackIntroduction - In today's world of computers and the internet, keeping important information safe and making sure no one can access your data are really important for companies. One big part of making sure everything is secure is protecting the way y...Discuss·2 likes·79 readspentesting
Rizwan SyedforBreachForcebreachforce.net·Sep 7, 2023Build your own Red Team Dropbox for VAPT / Red-TeamingBuild Your Own Pentesting Machine With Raspberry Pi | Red Team Kit 💡 This article will walk you through how to Build your own Pentesting Dropbox that could be useful for conducting VAPT audits and performing RED Teaming Tasks. Before making Dropb...Discuss·3 likes·141 readsredteaming
Jake GarrisonProj4ke.io·Aug 3, 2023My Journey in Cybersecurity Up to NowMindset "Those who work the hardest usually complain the least." -Ryan Cohen My journey in cybersecurity up to this point has been incredibly rewarding. Initially, I was unsure of where to even begin. This career path resembles a hydra with countle...Discuss·85 readsComputer Science
Matt Biedronskiblog.gonskicyber.com·Jun 6, 2023FeaturedOSCP 2023 - How I passed in 30 daysIn this article I want to share my OSCP journey and talk about how I was able to achieve a passing score on my 2nd OSCP attempt in May of 2023. I will briefly touch on my professional background in Offensive Security and share tips and advice that I ...Sandeep Panda and 2 others are discussing this3 people are discussing thisDiscuss·48 likes·6.7K readsoscp
Manoj Vignesh K Mkmmanoj.hashnode.dev·Aug 2, 2020ARP Spoofing using ScapyARP spoofing or ARP cache poisoning is a network exploitation technique in which a malicious node in a local area network claims to be one of the other nodes in the network. A malicious user performs this attack on LAN to establish itself as a man in...Discussinformation security