Skip to content
  • facebook
  • twitter
  • instagram
  • linkedin

CertCube Labs

Blog on Advance InfoSec Concepts

MENUMENU
  • Home
  • Exams Study material
    • cheatsheets
      • Reverse Shell Cheat Sheet
      • Searchsploit Cheat Sheet
      • File transfer cheatsheet for pentesters
      • Nmap scanning cheatsheet for beginners
      • Enumeration Cheatsheet & Guide
      • Msfvenom All in One cheatsheet
    • offensive-exploitation
      • Tools Allowed in OSCP
      • RCE with log poisoning Attack Methodologies
      • Pivoting and SSH Port forwarding Basics -Part 1
      • Pivoting & Port forwarding methods – part2
    • Stack based Buffer-overflow
      • OSCP – Detail Guide to Stack-based buffer Overflow – 1
      • OSCP – Detail Guide to Stack-based buffer Overflow – 2
      • OSCP – Detail Guide to Stack-based buffer Overflow – 3
      • OSCP – Detail Guide to Stack-based buffer Overflow – 4
      • OSCP – Detail Guide to Stack-based buffer Overflow – 5
      • OSCP – Detail Guide to Stack-based buffer Overflow – 6
      • OSCP – Detail Guide to Stack-based buffer Overflow – 7
      • OSCP – Detail Guide to Stack-based buffer Overflow – 8
      • OSCP – Detail Guide to Stack-based buffer Overflow – 9
    • SEH based Buffer Overflow
      • SEH Based Buffer overflow
      • OSCP SEH based buffer overflow – Part 2
  • Offensive Ops
    • Linux-Pentesting
      • Linux privilege Escalation methods
      • Linux Privilege Escalation all in one
      • Linux Privilege Escalation – Tools & Techniques
      • Linux detailed Enumeration – Commands
      • Linux Privilege Escalation – SUDO Rights
      • SUID Executables- Linux Privilege Escalation
      • Back To The Future: Unix Wildcards Injection
      • Restricted Shells Escaping Techniques
      • Restricted Linux shells escaping techniques – 2
    • Windows-Pentesting
      • THE NT ARCHITECTURE OF WINDOWS
      • WINDOWS COMMON TERMINOLOGIES
      • WINDOWS AUTHENTICATION PROTOCOLS
      • Windows Privilege Escalation Methods
      • Windows Attack Anatomy
      • Beginner Friendly Windows Privilege Escalation
      • Windows Privilege Escalation Guide – part 1 | Tools
      • Windows Privilege escalation – Part 2 | Enumeration
      • Windows privilege escalation – part 3 | Kernal-Exploits
      • Windows Kernel Exploitation – part 4 | Vulnerabilities
      • Herpaderping process– Evading Windows Defender Security
    • Active Directory Pentesting
      • AD Recon For Beginners
      • Powershell Restrictions bypasses
      • Kerberoasting initial: AS-REP Roasting
      • Kerberoasting Simplified
      • Kerberoasting Common tools
      • Pass the hash: A Nightmare still alive!
      • PowerShell Remoting For pentesters Cheatsheet
      • PowerUp Cheatsheet
      • Active Directory privilege escalation cheat sheet
      • AD exploitation Powershell Cheatsheet
      • Powershell Scripts Execute without Powershell
    • Web Application Pentesting Series
      • BurpSuite Primer for Pentesters (Beginner’s Edition) – Part 1
      • Burpsuite Common Terminologies for Pentesters (PART-2)
      • BurpSuite Proxy Configuration for Pentesters (PART-3)
      • BurpSuite Intruder for Pentesters (PART-4)
      • BurpSuite Repeater Recipe for Pentesters (PART-5)
      • Burpsuite Sequencer for Pentesters (PART-6)
      • BurpSuite Decoder Unwrap for Pentesters (PART-7)
      • BurpSuite Logger Secrets for Pentesters (PART-8)
      • BurpSuite Project Options for Pentesters (PART-9)
    • Offensive Web
      • Web Application Pentesting Checklist
      • Regular Expressions quick cheatsheet for pentesters – 101
      • CHEATSHEET – LFI & RCE & WEBSHELLS
      • Web Shells & Exploitation Fundamentals
      • WebShells & Exploitation – LFI to RCE
      • Advanced SQL Injections with LoadFile and Outfile
      • Wfuzz- The power of evil
      • AWAE Exam Review
      • Thick client Testing
      • OvertheWire Natas 1 to 34 Full writeup
  • Defensive Ops
    • OWNCLOUD CONFIGURATIONS IN VIRTUAL ENVIRONMENTS
    • Elastic SIEM Installation lab
    • Defensive Lab Series: PFSense Configuration
    • Defensive Lab Series: PFSense Installation
  • IoT pentesting
    • Foundations of IOT
      • IoT Primer for Pentesters – Part 1
      • IoT Primer for Pentesters – Part II
      • IoT Primer for Pentesters – Part III
      • IOT pentesting protocols -Part IV
    • BLE Pentest Series
  • Mobile AppSec
    • iOS-Pentesting
      • iOS IPA Architecture and JailBreak IOS 13.4.1
      • The Anatomy of the iOS file system in Depth -101
      • Build an IOS pentesting lab via XCode Simulator
      • Insecure Data storage Analysis of iOS Applications
      • Build the IPA From Device and IPA Container Analysis
      • Local Data Storage Of iPhone IPA from IOS device
      • Local Storage Analysis of IPA from the pentesting device
      • Decrypting IOS apps Essentials
      • Analyzing the Ipa like a pro
    • Android Pentesting
      • Android Pentesting Lab Setup – 101
      • Android SSL pinning bypass with Frida
      • Creating Rooted AVD in Android Studio
  • Certcube-trainings
    • How to start your career into cyber security
    • offensive CTF
  • Contact Us

Monthly Archive: March 2020

powershell scripts execute without powershell 0

All Blog / AD exploitation & Post exploitation

21st March 2020

Powershell Scripts Execute without Powershell

ad powershell cheatsheet 0

AD exploitation & Post exploitation / All Blog

9th March 2020

AD exploitation Powershell Cheatsheet

ad Powerup cheatsheet 0

AD exploitation & Post exploitation / All Blog

9th March 2020

PowerUp Cheatsheet

Editor Picks

14fi1d

TOP 40 Protocols

23rd February 2023

modern internet concept background 476363 5284

WORKING OF THE WEB

23rd February 2023

Topics List

  • AD exploitation & Post exploitation
  • All Blog
  • buffer overflow
  • cloud Security
  • IoT pentesting
  • Linux privilege escalation
  • mobile application security
  • OSCP Study material
  • web application pentesting
  • Windows-Pentesting

Important Links

  • TOP 40 Protocols
  • WORKING OF THE WEB
  • Headers And IP Message Formats
  • OverTheWire Bandit 1 To 15 Full Write-up
  • BurpSuite Project Options for Pentesters (PART-9)
  • BurpSuite Logger Secrets for Pentesters (PART-8)
  • BurpSuite Decoder Unwrap for Pentesters (PART-7)
  • Burpsuite Sequencer for Pentesters (PART-6)
  • BurpSuite Repeater Recipe for Pentesters (PART-5)
  • BurpSuite Intruder for Pentesters (PART-4)
  • BurpSuite Proxy Configuration for Pentesters (PART-3)
  • Burpsuite Common Terminologies for Pentesters (PART-2)
  • BurpSuite Primer for Pentesters (Beginner’s Edition) – Part 1
  • Android Pentesting Lab Setup – 101
  • Web Application Pentesting Checklist

Recent Comments

  • Top 40 Protocols: A Comprehensive Guide on BurpSuite Primer for Pentesters (Beginner’s Edition) – Part 1
  • Local Plumber on Linux Kernel Exploit list
  • continue reading this on Linux Kernel Exploit list
  • important link on Linux Kernel Exploit list
  • Illuminati Germany on Linux Kernel Exploit list

Archives

  • February 2023
  • January 2023
  • November 2022
  • October 2021
  • August 2021
  • July 2021
  • May 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • May 2019
  • April 2019
  • March 2019

Certcube labs YOUTUBE – lATEST UpDATES

https://www.youtube.com/watch?v=jarAla20knQ&t=37s

detailed updates on mail !

Loading

Categories

  • AD exploitation & Post exploitation (11)
  • All Blog (61)
  • buffer overflow (11)
  • cloud Security (2)
  • IoT pentesting (6)
  • Linux privilege escalation (14)
  • mobile application security (9)
  • OSCP Study material (34)
  • web application pentesting (9)
  • Windows-Pentesting (12)

Recent Comments

  • Top 40 Protocols: A Comprehensive Guide on BurpSuite Primer for Pentesters (Beginner’s Edition) – Part 1
  • Local Plumber on Linux Kernel Exploit list
  • continue reading this on Linux Kernel Exploit list
  • important link on Linux Kernel Exploit list
  • Illuminati Germany on Linux Kernel Exploit list
  • facebook
  • twitter
  • instagram
  • linkedin

CertCube Labs © 2023. All Rights Reserved.

WhatsApp us for trainings & demos