jamarirjamarir.hashnode.dev·Dec 20, 2024[HackTheBox] BastionJust another VHD Mountage / SAM Decryption / Quick AMSI Bypass / mRemoteNG Password Decryption Write-up Machine link. IppSec Walkthrough. Footprinting Open ports The open ports are: jamarir@kali:~$ nmap -sS -p- -v -Pn --disable-arp-ping -oA syn_ful...Active Directory / WindowsCTF
jamarirjamarir.hashnode.dev·Dec 15, 2024[HackTheBox] ResoluteJust another Null RPC / Password Spray / PowerShell Transcript Leak / DnsAdmins Privesc / CreateThread Stealthiness Write-up. Machine link. Ippsec Walkthrough. Footprinting Open ports The open ports shows our target is a Windows machine: jamarir@ka...Active Directory / WindowsCTF
jamarirjamarir.hashnode.dev·Dec 8, 2024[HackTheBox] BlackfieldJust another Anonynous-Guest / ASREPRoast / ForceChangePassword / UserEnum / LSASS / Registry Hive / NTDS_SAM-SYSTEM Decryption Write-up. There might be some discrepencies in this article. Indeed, I will sometimes use cme, and some other times nxc. ...Active Directory / WindowsCTF
Khushi TrivediforKeploy Community Blogkeploy.hashnode.dev·Dec 4, 2024Choosing the right Penetration Testing Tools for your systemOrganizations are in a sheer need to stay up to the minute and be ahead in protecting their systems and data. Penetration testing can prove to be a structured process that can mimic real-world vulnerabilities before it’s prone to any malicious exploi...4 likes·42 readsTesting
jamarirjamarir.hashnode.dev·Dec 1, 2024[OWASP MASTG] Android - DIVA (Damn Insecure and Vulnerable App)Just another Lab Setup / ADB / JADX / Apktool / Frida / Logcat / Native Lib / Insecure Storage / Input Validation / Access Control Write-up. Github page. Web page. APK link. OWASP page. DIVA (Damn insecure and vulnerable App) is an [Android] App int...65 readsMobileCTF
Roger Colque Calcinablogdevtrip.hashnode.dev·Nov 28, 2024Disabling Screenshots in Android Apps security feature in appIn mobile app development, especially for apps handling sensitive information like banking apps, security is a top priority. One essential feature developers often implement is disabling screenshots, which ensures users cannot capture or share critic...Security in Android App Mobile DevelopmentSecurity
Luis Diego Ragablog.ragab0t.com·Nov 27, 2024Hack the Box - Heist Walk-throughThis blog is related to Computer Security and Ethical hacking and does not promote hacking, cracking, software piracy or any kind of illegal activities. The blog is for informational and educational purpose and for those willing to learn about ethica...1 like·98 readsHack the Boxhacking
jamarirjamarir.hashnode.dev·Nov 24, 2024[HackTheBox] ForestJust another RPC / Port ranges / NTLMSSP / ASREPRoast / User DACL Abuse (RPC passwd) / DCSync Write-up. There might be some discrepencies in this article. Indeed, I will sometimes use cme, and some other times nxc. The methodology, however, remains ...Active Directory / WindowsCTF
b1d0wsb1d0ws.hashnode.dev·Nov 19, 2024AppSec Project - Chapter 4, SAST Tools and ContainerizationIntroduction Hello! Today, we’ll explore testing various SAST tools to evaluate their effectiveness in helping us secure our application. Additionally, we’ll containerize our app and make final adjustments to bring the project to completion. Our bran...120 readspentesting
Rosecurifylog.rosecurify.com·Nov 17, 2024Seclog - #100"The enemy does not check your risk register prior to attacking." - Sun Tzu, The Art of Cyber War 📚 SecMisc PoisonTap - Exploiting locked computers through USB peripherals, demonstrating techniques to bypass security measures on locked machines. Re...seclogBlueHat2024