Bypass Application Whitelisting using mshta.exe (Multiple Methods)
Today we are going to learn about different methods of HTA attack. HTA is a useful and important attack because it can bypass application whitelisting. In our previous article, we had discussed on...
View ArticleBypass Application Whitelisting using msbuild.exe (Multiple Methods)
This purpose to write this post is to demonstrate the most common and familiar techniques of whitelisting AppLocker bypass. As we know for security reason the system admin add group policies to...
View ArticleBypass Application Whitelisting using wmic.exe (Multiple Methods)
This purpose to write this post is to demonstrate the most common and familiar techniques of whitelisting AppLocker bypass. As we know for security reason the system admin add group policies to...
View ArticleBypass Application Whitelisting using regsrv32.exe (Multiple Methods)
This purpose to write this post is to demonstrate the most common and familiar techniques of whitelisting AppLocker bypass. As we know for security reason the system admin add group policies to...
View ArticleCommand and Control with HTTP Shell using JSRat
Learning only one framework such as Metasploit, etc. has its own limitations. Todays’ ever developing cyber world required end to end knowledge of every tool and framework so that if you are cut off of...
View ArticleBypass Application Whitelisting using rundll32.exe (Multiple Methods)
This purpose to write this post is to demonstrate the most common and familiar techniques of whitelisting AppLocker bypass. As we know for security reason the system admin add group policies to...
View ArticleGreatSct – An Application Whitelist Bypass Tool
While wrting Applocker bypass series, we found a new tool which was especially design for bypassing whitelisting application. So Idecided to write this article where e are introducing another most...
View ArticleExploiting Windows PC using Malicious Contact VCF file
A huge shoutout to cyber security researcher John Page for bringing this vulnerability into the internet’s eye on 15th January 2019. This was a 0 day exploit and of course works with the latest windows...
View ArticleExploiting Windows using Contact File HTML Injection/RCE
After the 0 day exploit on malicious VCF file in windows, cyber security researcher John Page deserves another round of applause for bringing this vulnerability onto exploit-db’s eye on 23rd January...
View ArticleJenkins Pentest Lab Setup
Hey!You all know that we have performed so many CTF challenges and we got to know about Jenkins there.So lets know about Jenkins better. For this we are here with the new challenges which you will face...
View ArticleMultiple Ways to Exploiting Windows PC using PowerShell Empire
This is our second post in the article series ‘PowerShell Empire’. In this article, we will cover all the exploits that lead to windows exploitation with the empire. To our first post on empire series,...
View ArticleBypass Application Whitelisting using Weak Path Rule
Finding loopholes is very important when you are the part of a pen-testing team. Because such loopholes are the source of hacking as the attacker will actively look for them. So in order to patch such...
View ArticleWindows Firewall Post Exploitation with Netsh
This article is will provide an in-depth post exploitation guide to gather all the information about the victim’s Firewall and network settings. Table of Content : Introduction to Firewall Rules of...
View ArticleRed Team/Blue Team Practice on Wdigest
In this article, we will show you the methods of protecting your system against MIMIKATZ that fetches password in clear text from wdigest. As you know the Pen-tester and the red team uses mimikatz for...
View ArticlePentest Lab Setup on Memcached
In this article, we are going to learn about pen-testing in Memcached lab setup in Ubuntu 18.04. Memcached server is used by corporations in order to increase the speed of their network as it helps to...
View ArticleBypass Application Whitelisting using cmstp
By default, Applocker allows the executing of binaries in the folder that is the major reason that it can be bypassed. It has been found that such binaries can easily be used in order to bypass...
View ArticleTrevorC2 – Command and Control
TrevorC2 is command and control framework. It is a client/server model which works through a browser masquerading as C2 tool. It works on different time intervals which makes it almost impossible to be...
View ArticlePenetration Testing on Memcached Server
In our previous article, we learned how to configure Memcached Server in Ubuntu 18.04 system to design our own pentest lab. Today we will learn multiple ways to exploit Memcached Server. Table of...
View ArticleComprehensive Guide on Snort (Part 1)
This article will introduce a guide to understand IDS using Snort as an example for it. Table of Content : Introduction to IDS Categories of IDS Types of IDS Introduction to Snort Introduction to IDS...
View ArticlePost Exploitation on Saved Password with LaZagne
This article will be focused on The LaZagne project and its usage in Post Exploitation. Table of Content: Introduction of LaZagne Project Syntax and Parameters Achieve Meterpreter and Upload LaZagne...
View Article