Windows Privilege Escalation Methods

Windows, compared to other operating systems, holds a market share of over 80% for desktops. It is the de-facto standard operating system of enterprises and…
Read More

Pivoting and SSH Port forwarding Basics -Part 1

First and foremost, what is SSH tunneling and how does it work? SSH tunneling is a technique that allows traffic to be routed through an…
Read More

RCE with log poisoning Attack Methodologies

Some of the important log files are the following :- http://example.com/index.php?page=/var/log/apache/access.log http://example.com/index.php?page=/var/log/apache/error.log http://example.com/index.php?page=/var/log/nginx/access.log http://example.com/index.php?page=/var/log/nginx/error.log http://example.com/index.php?page=/var/log/vsftpd.log http://example.com/index.php?page=/var/log/sshd.log http://example.com/index.php?page=/var/log/auth http://example.com/index.php?page=/var/log/mail http://example.com/index.php?page=/var/log/httpd/error_log http://example.com/index.php?page=/usr/local/apache/log/error_log http://example.com/index.php?page=/usr/local/apache2/log/error_log It is important to…
Read More

Linux IP tables for Beginners

This blog introduces some simple firewall rules and how to configure rules with iptables. iptables is an application that allows a user to configure the firewall functionality…
Read More

Msfvenom All in One cheatsheet

One of the most powerful utilities of Metasploit is its payload module. Its abilities are underutilized ( by the beginners ) mostly, due to lack…
Read More