Skip to content
Menu  
  • Contact Us

CertCube Labs

– Blog on insane exploitation Concepts

  • Home
  • Exams Study material
    • cheatsheets
      • Reverse Shell Cheat Sheet
      • Searchsploit Cheat Sheet
      • File transfer cheatsheet for pentesters
      • Nmap scanning cheatsheet for beginners
      • Enumeration Cheatsheet & Guide
      • Msfvenom All in One cheatsheet
    • offensive-exploitation
      • Tools Allowed in OSCP
      • RCE with log poisoning Attack Methodologies
      • Pivoting and SSH Port forwarding Basics -Part 1
      • Pivoting & Port forwarding methods – part2
    • Stack based Buffer-overflow
      • OSCP – Detail Guide to Stack-based buffer Overflow – 1
      • OSCP – Detail Guide to Stack-based buffer Overflow – 2
      • OSCP – Detail Guide to Stack-based buffer Overflow – 3
      • OSCP – Detail Guide to Stack-based buffer Overflow – 4
      • OSCP – Detail Guide to Stack-based buffer Overflow – 5
      • OSCP – Detail Guide to Stack-based buffer Overflow – 6
      • OSCP – Detail Guide to Stack-based buffer Overflow – 7
      • OSCP – Detail Guide to Stack-based buffer Overflow – 8
      • OSCP – Detail Guide to Stack-based buffer Overflow – 9
    • SEH based Buffer Overflow
      • SEH Based Buffer overflow
      • OSCP SEH based buffer overflow – Part 2
  • Offensive Ops
    • Linux-Pentesting
      • Linux privilege Escalation methods
      • Linux Privilege Escalation all in one
      • Linux Privilege Escalation – Tools & Techniques
      • Linux detailed Enumeration – Commands
      • Linux Privilege Escalation – SUDO Rights
      • SUID Executables- Linux Privilege Escalation
      • Back To The Future: Unix Wildcards Injection
      • Restricted Shells Escaping Techniques
      • Restricted Linux shells escaping techniques – 2
    • Windows-Pentesting
      • THE NT ARCHITECTURE OF WINDOWS
      • WINDOWS COMMON TERMINOLOGIES
      • WINDOWS AUTHENTICATION PROTOCOLS
      • Windows Privilege Escalation Methods
      • Windows Attack Anatomy
      • Beginner Friendly Windows Privilege Escalation
      • Windows Privilege Escalation Guide – part 1 | Tools
      • Windows Privilege escalation – Part 2 | Enumeration
      • Windows privilege escalation – part 3 | Kernal-Exploits
      • Windows Kernel Exploitation – part 4 | Vulnerabilities
      • Herpaderping process– Evading Windows Defender Security
    • Active Directory Pentesting
      • AD Recon For Beginners
      • Powershell Restrictions bypasses
      • Kerberoasting initial: AS-REP Roasting
      • Kerberoasting Simplified
      • Kerberoasting Common tools
      • Pass the hash: A Nightmare still alive!
      • PowerShell Remoting For pentesters Cheatsheet
      • PowerUp Cheatsheet
      • Active Directory privilege escalation cheat sheet
      • AD exploitation Powershell Cheatsheet
      • Powershell Scripts Execute without Powershell
    • web-specific
      • Regular Expressions quick cheatsheet for pentesters – 101
      • CHEATSHEET – LFI & RCE & WEBSHELLS
      • Web Shells & Exploitation Fundamentals
      • WebShells & Exploitation – LFI to RCE
      • Advanced SQL Injections with LoadFile and Outfile
      • Wfuzz- The power of evil
      • AWAE Exam Review
      • Thick client Testing
      • OvertheWire Natas 1 to 34 Full writeup
  • Defensive Ops
    • OWNCLOUD CONFIGURATIONS IN VIRTUAL ENVIRONMENTS
    • Elastic SIEM Installation lab
    • Defensive Lab Series: PFSense Configuration
    • Defensive Lab Series: PFSense Installation
  • IoT pentesting
    • Foundations of IOT
      • IoT Primer for Pentesters – Part 1
      • IoT Primer for Pentesters – Part II
      • IoT Primer for Pentesters – Part III
      • IOT pentesting protocols -Part IV
    • BLE Pentest Series
  • Mobile AppSec
    • iOS-Pentesting
      • iOS IPA Architecture and JailBreak IOS 13.4.1
      • The Anatomy of the iOS file system in Depth -101
      • Build an IOS pentesting lab via XCode Simulator
      • Insecure Data storage Analysis of iOS Applications
      • Build the IPA From Device and IPA Container Analysis
      • Local Data Storage Of iPhone IPA from IOS device
      • Local Storage Analysis of IPA from the pentesting device
      • Decrypting IOS apps Essentials
      • Analyzing the Ipa like a pro
    • Android Pentesting
      • Android SSL pinning bypass with Frida
      • Creating Rooted AVD in Android Studio
  • Certcube-trainings
    • offensive CTF
    • enterprise pentester training
      • How to start your career into cyber security
  • Contact Us

CertCube Labs

Basic Overview of API
All Blog

Basic Overview of API

Posted on 4th October 20214th October 2021 | by c3rtcub3_labs

What is an API and How Do They Work? In the process of improving your applications, you will eventually come […]

Leave a Comment on Basic Overview of API
File transfer cheatsheet for pentesters
All Blog

File transfer cheatsheet for pentesters

Posted on 15th August 202115th August 2021 | by c3rtcub3_labs

File transfer cheatsheet for pentesters aims to provide most common ways to send files between machines during engagements . Hosting […]

Leave a Comment on File transfer cheatsheet for pentesters
Nmap scanning cheatsheet for beginners
All BlogOSCP Study material

Nmap scanning cheatsheet for beginners

Posted on 14th July 202114th July 2021 | by c3rtcub3_labs

This nmap scanning cheatsheet is a comprehensive guide for absolute beginners . At the end of the blog some useful […]

Leave a Comment on Nmap scanning cheatsheet for beginners
Analyzing the Ipa like a pro
All Blogmobile application security

Analyzing the Ipa like a pro

Posted on 13th July 202113th July 2021 | by c3rtcub3_labs

This blog explains the procedure to analyze and identify potential security vulnerabilities in the files present in the IPA file […]

Leave a Comment on Analyzing the Ipa like a pro
Regular Expressions quick cheatsheet for pentesters – 101
All BlogOSCP Study material

Regular Expressions quick cheatsheet for pentesters – 101

Posted on 23rd May 202123rd May 2021 | by c3rtcub3_labs

The Regular Expressions quick cheatsheet for pentesters topic in code review is explained by Jonny Fox . The entire credit […]

Leave a Comment on Regular Expressions quick cheatsheet for pentesters – 101
WINDOWS COMMON TERMINOLOGIES
All Blog

WINDOWS COMMON TERMINOLOGIES

Posted on 17th May 202118th May 2021 | by Sajal

This blog series is aimed at giving security practitioners (both defense & offense ) a thorough understanding of Windows access […]

Leave a Comment on WINDOWS COMMON TERMINOLOGIES
WINDOWS AUTHENTICATION PROTOCOLS
All Blog

WINDOWS AUTHENTICATION PROTOCOLS

Posted on 13th May 202113th May 2021 | by Sajal

The Windows operating system implements a default set of authentication protocols, including Kerberos, NTLM, Transport Layer Security/Secure Sockets Layer (TLS/SSL), […]

Leave a Comment on WINDOWS AUTHENTICATION PROTOCOLS
THE NT ARCHITECTURE OF WINDOWS
All Blog

THE NT ARCHITECTURE OF WINDOWS

Posted on 11th May 202113th May 2021 | by Sajal

The NT Architecture of Windows, a line of operating systems produced and sold by Microsoft, is a layered design that […]

Leave a Comment on THE NT ARCHITECTURE OF WINDOWS
OWNCLOUD CONFIGURATIONS IN VIRTUAL ENVIRONMENTS
All Blog

OWNCLOUD CONFIGURATIONS IN VIRTUAL ENVIRONMENTS

Posted on 26th March 202113th May 2021 | by Sajal

In the current world of increased data requirements, cloud storage is like a blessing. That’s the reason Onedrive, Mega, Google […]

Leave a Comment on OWNCLOUD CONFIGURATIONS IN VIRTUAL ENVIRONMENTS
Defensive Lab Series: PFSense Configuration
All Blog

Defensive Lab Series: PFSense Configuration

Posted on 24th March 202113th May 2021 | by Sajal

In the previous post, we covered the process of installing Pfsense. In this post, we’ll be doing pfsense configuration to […]

Leave a Comment on Defensive Lab Series: PFSense Configuration

Posts navigation

1 2 … 10 Next

Categories

  • AD exploitation & Post exploitation (11)
  • All Blog (56)
  • buffer overflow (11)
  • cloud Security (2)
  • IoT pentesting (6)
  • Linux privilege escalation (14)
  • mobile application security (8)
  • OSCP Study material (34)
  • Windows-Pentesting (12)

Recent Comments

  • prescriptions from canada without on OSCP – Enumeration Cheatsheet & Guide
  • canadian pharmacys on OSCP – Enumeration Cheatsheet & Guide
  • https://62553dced4718.site123.me/ on OSCP – Enumeration Cheatsheet & Guide
  • pharmacy-online.yolasite.com on OSCP – Enumeration Cheatsheet & Guide
  • canadian pharmacies that are legit on OSCP – Enumeration Cheatsheet & Guide

CertCube Labs

  • Email
  • facebook
  • twitter
  • instagram
  • linkedin
© Copyrights 2022, CertCube Labs A theme by MintTM
Proudly powered by WordPress

WhatsApp us for trainings & demos