Comprehensive Guide to Port Redirection using Rinetd
Hello friends today we will discuss what is Port redirecting/ forwarding and necessary Steps for this technique for accessing network traffic through firewall restricted port. First check out following...
View ArticlePrivilege Escalation in Linux using etc/passwd file
In this article, we will learn “Various methods to alter etc/passwd file to create or modify a user for root privileges”. Sometimes, it is necessary to know ‘how to edit your own user for privilege...
View ArticleCapture NTLM Hashes using PDF (Bad-Pdf)
Today we are demonstrating stealing NTLM hashes through a pdf file. We have already discussed the various method to Capture NTLM Hashes in a Network in our previous article. Recently a new tool has...
View ArticleLinux Privilege Escalation using SUID Binaries
In our previous article we have discussed “Privilege Escalation in Linux using etc/passwd file” and today we will learn “Privilege Escalation in Linux using SUID Permission.” While solving CTF...
View ArticleLinux Privilege Escalation using Exploiting Sudo Rights
In our previous articles, we have discussed Linux Privilege Escalation using SUID Binaries and /etc/passwd file and today we are posting another method of “Linux privilege Escalation using Sudoers...
View ArticleLinux Privilege Escalation using Misconfigured NFS
After solving several OSCP Challenges we decided to write the article on the various method used for Linux privilege escalation, that could be helpful for our readers in their penetration testing...
View ArticleLinux Privilege Escalation Using PATH Variable
After solving several OSCP Challenges we decided to write the article on the various method used for Linux privilege escalation, that could be helpful for our readers in their penetration testing...
View ArticleBeginners Guide for John the Ripper (Part 1)
We know the importance of John the ripper in penetration testing, as it is quite popular among password cracking tool. In this article, we are introducing the John the ripper and its various usage for...
View ArticleWorking of Traceroute using Wireshark
Hello Friends!! Today we are going to discuss working with traceroute using UDP/ICMP/TCP packets with help of Wireshark. Traceroute or Tracert: It is a CUI based computer network diagnostic tools used...
View ArticleBeginners Guide for John the Ripper (Part 2)
We learned most of the basic information on John the Ripper in our Previous Article which can be found here. In this article we will use John the Ripper to crack the password hashes of some of the file...
View ArticlePenetration Testing on X11 Server
X is an architecture-independent system for remote graphical user interfaces and input device capabilities. Each person using a networked terminal has the ability to interact with the display with any...
View ArticleMultiple Ways to Get root through Writable File
In Linux everything is a file, including directories and devices that have permissions to allow or restricted three operations i.e. read/write/execute. When admin set permission for any file, he should...
View ArticleLinux Privilege Escalation using LD_Preload
Hello friends, today we are going to discuss a new technique of privilege escalation by exploiting an environment variable “LD_Preload” but to practice this you must take some help from our previous...
View ArticleBeginner Guide to impacket Tool kit
Impacket is a collection of Python classes for working with network protocols. Impacket is focused on providing low-level programmatic access to the packets and for some protocols (e.g. SMB1-3 and...
View ArticleLinux Privilege Escalation by Exploiting Cronjobs
After solving several OSCP Challenges we decided to write the article on the various method used for Linux privilege escalation, that could be helpful for our readers in their penetration testing...
View ArticleExploiting Wildcard for Privilege Escalation
Hello friends!! In this article, we will cover “Wildcard Injection” an interesting old-school UNIX hacking technique, which is still a successful approach for Post exploitation and even many...
View Article3 Ways Extract Password Hashes from NTDS.dit
Hello friends!! Today we are going to discuss some forensic tool which is quite helpful in penetration testing to obtain NTLM password hashes from inside the host machine. As we know while penetration...
View ArticleUnderstanding Nmap Packet Trace
Hello friends!! Today we are going to discussed how to capture network packet using nmap. And used wireshark for comparing its result from nmap. In this article we mainly focused on what types of...
View ArticleWindows Privilege Escalation (Unquoted Path Service)
Hello Friends!! In this article we are demonstrating Windows privilege escalation via Unquoted service Path. In penetration testing when we spawn command shell as local user, it is not possible to...
View ArticleWindows Privilege Escalation (AlwaysInstallElevated)
Hello Friends!! In this article we are demonstrating the Windows privilege escalation method via the method of AlwaysInstallElevated policy. In penetration testing, when we spawn command shell as local...
View Article