Posts by Tag

eWPT

Back to Top ↑

PHP

Back to Top ↑

Apache

Back to Top ↑

FTP

Back to Top ↑

SSH

Back to Top ↑

HTTP

Back to Top ↑

OSWE

Back to Top ↑

Information Leakage

Back to Top ↑

Subdomain Enumeration

Back to Top ↑

Metasploit

Back to Top ↑

eJPT

Back to Top ↑

Web Site Structure Discovery

Back to Top ↑

SUID Exploitation

Back to Top ↑

Authentication bypass

Back to Top ↑

Arbitrary File Upload

Back to Top ↑

Path Hijacking

Back to Top ↑

Vulnerability Assessment

Back to Top ↑

Databases

Back to Top ↑

Custom Applications

Back to Top ↑

Protocols

Back to Top ↑

Source Code Analysis

Back to Top ↑

PostgreSQL

Back to Top ↑

Reconnaissance

Back to Top ↑

Password Cracking

Back to Top ↑

SUDO Exploitation

Back to Top ↑

SQL Injection

Back to Top ↑

Remote Code Execution

Back to Top ↑

Clear Text Credentials

Back to Top ↑

Anonymous/Guest Access

Back to Top ↑

Apache OFBiz EXploitation (Authentication Bypass)

Back to Top ↑

ANalysis of OFBiz code to understand the hashed storage mechanism

Back to Top ↑

Adapating found hashes to a crackable format

Back to Top ↑

Cracking Hashes [Privilege Escalation]

Back to Top ↑

Docker

Back to Top ↑

Jenkins Exploitation CVE-2024-23897 in order to read arbitrary files (RCE)

Back to Top ↑

Cracking Hashes (Hashcat)

Back to Top ↑

Abusing the Jenkins cipher to crack the password [Privilege Escalation]

Back to Top ↑

Abusing declared Javascript functions from the browser console

Back to Top ↑

Abusing the API to generate a valid invite code

Back to Top ↑

Abusing the API to elevate our privilege to administrator

Back to Top ↑

Command injection via poorly designed API functionality

Back to Top ↑

Privilege Escalation via Kernel Exploitation (CVE-2023-0386) - OverlayFS Vulnerability

Back to Top ↑

OSCP

Back to Top ↑

LFI through CV Download

Back to Top ↑

Abusing ViewState IIS Parameter + web.config secrets to achieve RCE

Back to Top ↑

Playing with ysoserial.net to create a serialized payload

Back to Top ↑

Reading a powershell credential and decrypting the contents of the PSCredential object

Back to Top ↑

RunasCs.exe to execute command as another user whose credentials are known to us

Back to Top ↑

Abusing SeDebugPrivilege [Privilege Escalation]

Back to Top ↑

Samba 3.0.20 < 3.0.25rc3 - Username Map Script [Command Execution]

Back to Top ↑

GitHub Pages

Back to Top ↑

Jekyll

Back to Top ↑

Ruby

Back to Top ↑

Bundler

Back to Top ↑

Desarrollo web

Back to Top ↑

Markdown

Back to Top ↑

Linux

Back to Top ↑

Web Enumeration

Back to Top ↑

PCAP Analysis

Back to Top ↑

CVE-2024-21413

Back to Top ↑

CVE-2023-2255

Back to Top ↑

nmap

Back to Top ↑

hashcat

Back to Top ↑

john

Back to Top ↑

responder

Back to Top ↑

evil-winrm

Back to Top ↑

podman

Back to Top ↑

crackmapexec

Back to Top ↑

swaks

Back to Top ↑

netcat

Back to Top ↑

smbclient

Back to Top ↑

nishang

Back to Top ↑

libreoffice

Back to Top ↑

powershell

Back to Top ↑

smb

Back to Top ↑

smtp

Back to Top ↑

ntlm

Back to Top ↑

ws-management

Back to Top ↑

Chamilo LMS Exploitation

Back to Top ↑

Unauthenticated Command Injection [CVE-2023-31803] (RCE)

Back to Top ↑

Abusing Sudoers

Back to Top ↑

Custom Bash Script (playing with setfacl) [Privilege Escalation]

Back to Top ↑