Skip to content
  • facebook
  • twitter
  • instagram
  • linkedin

CertCube Labs

Blog on Advance InfoSec Concepts

MENUMENU
  • Home
  • Assessment Foundations
    • BurpSuite Primer
      • BurpSuite Primer for Pentesters (Beginner’s Edition) – Part 1
      • Burpsuite Common Terminologies for Pentesters (PART-2)
      • BurpSuite Proxy Configuration for Pentesters (PART-3)
      • BurpSuite Intruder for Pentesters (PART-4)
      • BurpSuite Repeater Recipe for Pentesters (PART-5)
      • Burpsuite Sequencer for Pentesters (PART-6)
      • BurpSuite Decoder Unwrap for Pentesters (PART-7)
      • BurpSuite Logger Secrets for Pentesters (PART-8)
      • BurpSuite Project Options for Pentesters (PART-9)
    • Pentesting cheatsheets
      • Reverse Shell Cheat Sheet
      • Searchsploit Cheat Sheet
      • File transfer cheatsheet for pentesters
      • Nmap scanning cheatsheet for beginners
      • Enumeration Cheatsheet & Guide
      • Msfvenom All in One cheatsheet
    • Offensive Web
      • Web Application Pentesting Checklist
      • Regular Expressions quick cheatsheet for pentesters – 101
      • CHEATSHEET – LFI & RCE & WEBSHELLS
      • Web Shells & Exploitation Fundamentals
      • WebShells & Exploitation – LFI to RCE
      • Advanced SQL Injections with LoadFile and Outfile
      • Wfuzz- The power of evil
      • AWAE Exam Review
      • Thick client Testing
      • OvertheWire Natas 1 to 34 Full writeup
    • offensive-exploitation
      • Tools Allowed in OSCP
      • RCE with log poisoning Attack Methodologies
      • Pivoting and SSH Port forwarding Basics -Part 1
      • Pivoting & Port forwarding methods – part2
    • Stack based Buffer-overflow
      • OSCP – Detail Guide to Stack-based buffer Overflow – 1
      • OSCP – Detail Guide to Stack-based buffer Overflow – 2
      • OSCP – Detail Guide to Stack-based buffer Overflow – 3
      • OSCP – Detail Guide to Stack-based buffer Overflow – 4
      • OSCP – Detail Guide to Stack-based buffer Overflow – 5
      • OSCP – Detail Guide to Stack-based buffer Overflow – 6
      • OSCP – Detail Guide to Stack-based buffer Overflow – 7
      • OSCP – Detail Guide to Stack-based buffer Overflow – 8
      • OSCP – Detail Guide to Stack-based buffer Overflow – 9
    • SEH based Buffer Overflow
      • SEH Based Buffer overflow
      • OSCP SEH based buffer overflow – Part 2
  • Offensive Ops
    • Linux-Pentesting
      • Linux privilege Escalation methods
      • Linux Privilege Escalation all in one
      • Linux Privilege Escalation – Tools & Techniques
      • Linux detailed Enumeration – Commands
      • Linux Privilege Escalation – SUDO Rights
      • SUID Executables- Linux Privilege Escalation
      • Back To The Future: Unix Wildcards Injection
      • Restricted Shells Escaping Techniques
      • Restricted Linux shells escaping techniques – 2
    • Windows-Pentesting
      • THE NT ARCHITECTURE OF WINDOWS
      • WINDOWS COMMON TERMINOLOGIES
      • WINDOWS AUTHENTICATION PROTOCOLS
      • Windows Privilege Escalation Methods
      • Windows Attack Anatomy
      • Beginner Friendly Windows Privilege Escalation
      • Windows Privilege Escalation Guide – part 1 | Tools
      • Windows Privilege escalation – Part 2 | Enumeration
      • Windows privilege escalation – part 3 | Kernal-Exploits
      • Windows Kernel Exploitation – part 4 | Vulnerabilities
      • Herpaderping process– Evading Windows Defender Security
    • Active Directory Pentesting
      • AD Recon For Beginners
      • Powershell Restrictions bypasses
      • Kerberoasting initial: AS-REP Roasting
      • Kerberoasting Simplified
      • Kerberoasting Common tools
      • Pass the hash: A Nightmare still alive!
      • PowerShell Remoting For pentesters Cheatsheet
      • PowerUp Cheatsheet
      • Active Directory privilege escalation cheat sheet
      • AD exploitation Powershell Cheatsheet
      • Powershell Scripts Execute without Powershell
  • Defensive Ops
    • OWNCLOUD CONFIGURATIONS IN VIRTUAL ENVIRONMENTS
    • Elastic SIEM Installation lab
    • Defensive Lab Series: PFSense Configuration
    • Defensive Lab Series: PFSense Installation
  • IoT pentesting
    • Foundations of IOT
      • IoT Primer for Pentesters – Part 1
      • IoT Primer for Pentesters – Part II
      • IoT Primer for Pentesters – Part III
      • IOT pentesting protocols -Part IV
    • BLE Pentest Series
  • Mobile AppSec
    • iOS-Pentesting
      • iOS Pentesting Lab Setup with Palera1n
      • iOS IPA Architecture
      • The Anatomy of the iOS file system in Depth -101
      • Build an IOS pentesting lab via XCode Simulator
      • Insecure Data storage Analysis of iOS Applications
      • Build the IPA From Device and IPA Container Analysis
      • Local Data Storage Of iPhone IPA from IOS device
      • Local Storage Analysis of IPA from the pentesting device
      • Decrypting IOS apps Essentials
      • Analyzing the Ipa like a pro
    • Android Pentesting
      • Android Pentesting Lab Setup – 101
      • Android SSL pinning bypass with Frida
      • Creating Rooted AVD in Android Studio
  • Offensive Trainings
    • OSCP & Beyond Training
    • How to start your career into cyber security
  • Contact Us

Monthly Archive: March 2020

powershell scripts execute without powershell 0

All Blog / AD exploitation & Post exploitation

21st March 2020

Powershell Scripts Execute without Powershell

ad powershell cheatsheet 0

AD exploitation & Post exploitation / All Blog

9th March 2020

AD exploitation Powershell Cheatsheet

ad Powerup cheatsheet 0

AD exploitation & Post exploitation / All Blog

9th March 2020

PowerUp Cheatsheet

Editor Picks

912877 700b

PORT SWIGGER (Business Logic Vulnerabilities)

16th November 2023

1.palera1n install

iOS Pentesting Lab Setup with Palera1n

8th October 2023

Topics List

  • AD exploitation & Post exploitation
  • All Blog
  • buffer overflow
  • cloud Security
  • IoT pentesting
  • Linux privilege escalation
  • mobile application security
  • OSCP Study material
  • web application pentesting
  • Windows-Pentesting

Important Links

  • PORT SWIGGER (Business Logic Vulnerabilities)
  • iOS Pentesting Lab Setup with Palera1n
  • Portswigger WebSocket Vulnerability Labs Write-up!!
  • Portswigger Directory Traversal Vulnerability Labs Write-up!!
  • Portswigger Broken Access Control And Privil3ge Escalation Labs Write-up!!
  • Portswigger Information Disclosure Labs Write-up!!
  • Access Control Vulnerabilities And Privil3ge Escalation Breakthrough!!!
  • Portswigger SQL INJECTION Labs Write-up!!
  • WEBSOCKETS-Everything You Need To Know About W3bsock3t Pentesting!!
  • A Guide to Directory Traversal Vulnerability in 2023
  • The Only Information Disclosure Guide You’ll Ever Need!!
  • The A – Z Of SQL Injection P3NTESTING
  • SPRING BOOT PENTESTING PART 5- SECURING SPRING WEB APPS AND API
  • SPRING BOOT PENTESTING PART 4- SPRING4SHELL + JOLOKIA
  • SPRING BOOT PENTESTING PART 3- LAB SETUP+EXPLOITS WALKTHROUGH

Recent Comments

  • secret on Pivoting and SSH Port forwarding Basics -Part 1
  • Top 40 Protocols: A Comprehensive Guide on BurpSuite Primer for Pentesters (Beginner’s Edition) – Part 1
  • Local Plumber on Linux Kernel Exploit list
  • continue reading this on Linux Kernel Exploit list
  • important link on Linux Kernel Exploit list

Archives

  • November 2023
  • October 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • November 2022
  • October 2021
  • August 2021
  • July 2021
  • May 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • May 2019
  • April 2019
  • March 2019

Certcube labs YOUTUBE – lATEST UpDATES

https://www.youtube.com/watch?v=jarAla20knQ&t=37s

detailed updates on mail !

Loading

Categories

  • AD exploitation & Post exploitation (11)
  • All Blog (78)
  • buffer overflow (11)
  • cloud Security (2)
  • IoT pentesting (6)
  • Linux privilege escalation (14)
  • mobile application security (9)
  • OSCP Study material (34)
  • web application pentesting (9)
  • Windows-Pentesting (12)

Recent Comments

  • secret on Pivoting and SSH Port forwarding Basics -Part 1
  • Top 40 Protocols: A Comprehensive Guide on BurpSuite Primer for Pentesters (Beginner’s Edition) – Part 1
  • Local Plumber on Linux Kernel Exploit list
  • continue reading this on Linux Kernel Exploit list
  • important link on Linux Kernel Exploit list
  • facebook
  • twitter
  • instagram
  • linkedin

CertCube Labs © 2023. All Rights Reserved.

WhatsApp us for trainings & demos