Skip to content
  • facebook
  • twitter
  • instagram
  • linkedin

CertCube Labs

Blog on Advance InfoSec Concepts

MENUMENU
  • Home
  • Exams Study material
    • cheatsheets
      • Reverse Shell Cheat Sheet
      • Searchsploit Cheat Sheet
      • File transfer cheatsheet for pentesters
      • Nmap scanning cheatsheet for beginners
      • Enumeration Cheatsheet & Guide
      • Msfvenom All in One cheatsheet
    • offensive-exploitation
      • Tools Allowed in OSCP
      • RCE with log poisoning Attack Methodologies
      • Pivoting and SSH Port forwarding Basics -Part 1
      • Pivoting & Port forwarding methods – part2
    • Stack based Buffer-overflow
      • OSCP – Detail Guide to Stack-based buffer Overflow – 1
      • OSCP – Detail Guide to Stack-based buffer Overflow – 2
      • OSCP – Detail Guide to Stack-based buffer Overflow – 3
      • OSCP – Detail Guide to Stack-based buffer Overflow – 4
      • OSCP – Detail Guide to Stack-based buffer Overflow – 5
      • OSCP – Detail Guide to Stack-based buffer Overflow – 6
      • OSCP – Detail Guide to Stack-based buffer Overflow – 7
      • OSCP – Detail Guide to Stack-based buffer Overflow – 8
      • OSCP – Detail Guide to Stack-based buffer Overflow – 9
    • SEH based Buffer Overflow
      • SEH Based Buffer overflow
      • OSCP SEH based buffer overflow – Part 2
  • Offensive Ops
    • Linux-Pentesting
      • Linux privilege Escalation methods
      • Linux Privilege Escalation all in one
      • Linux Privilege Escalation – Tools & Techniques
      • Linux detailed Enumeration – Commands
      • Linux Privilege Escalation – SUDO Rights
      • SUID Executables- Linux Privilege Escalation
      • Back To The Future: Unix Wildcards Injection
      • Restricted Shells Escaping Techniques
      • Restricted Linux shells escaping techniques – 2
    • Windows-Pentesting
      • THE NT ARCHITECTURE OF WINDOWS
      • WINDOWS COMMON TERMINOLOGIES
      • WINDOWS AUTHENTICATION PROTOCOLS
      • Windows Privilege Escalation Methods
      • Windows Attack Anatomy
      • Beginner Friendly Windows Privilege Escalation
      • Windows Privilege Escalation Guide – part 1 | Tools
      • Windows Privilege escalation – Part 2 | Enumeration
      • Windows privilege escalation – part 3 | Kernal-Exploits
      • Windows Kernel Exploitation – part 4 | Vulnerabilities
      • Herpaderping process– Evading Windows Defender Security
    • Active Directory Pentesting
      • AD Recon For Beginners
      • Powershell Restrictions bypasses
      • Kerberoasting initial: AS-REP Roasting
      • Kerberoasting Simplified
      • Kerberoasting Common tools
      • Pass the hash: A Nightmare still alive!
      • PowerShell Remoting For pentesters Cheatsheet
      • PowerUp Cheatsheet
      • Active Directory privilege escalation cheat sheet
      • AD exploitation Powershell Cheatsheet
      • Powershell Scripts Execute without Powershell
    • Web Application Pentesting Series
      • BurpSuite Primer for Pentesters (Beginner’s Edition) – Part 1
      • Burpsuite Common Terminologies for Pentesters (PART-2)
      • BurpSuite Proxy Configuration for Pentesters (PART-3)
      • BurpSuite Intruder for Pentesters (PART-4)
      • BurpSuite Repeater Recipe for Pentesters (PART-5)
      • Burpsuite Sequencer for Pentesters (PART-6)
      • BurpSuite Decoder Unwrap for Pentesters (PART-7)
      • BurpSuite Logger Secrets for Pentesters (PART-8)
      • BurpSuite Project Options for Pentesters (PART-9)
    • Offensive Web
      • Web Application Pentesting Checklist
      • Regular Expressions quick cheatsheet for pentesters – 101
      • CHEATSHEET – LFI & RCE & WEBSHELLS
      • Web Shells & Exploitation Fundamentals
      • WebShells & Exploitation – LFI to RCE
      • Advanced SQL Injections with LoadFile and Outfile
      • Wfuzz- The power of evil
      • AWAE Exam Review
      • Thick client Testing
      • OvertheWire Natas 1 to 34 Full writeup
  • Defensive Ops
    • OWNCLOUD CONFIGURATIONS IN VIRTUAL ENVIRONMENTS
    • Elastic SIEM Installation lab
    • Defensive Lab Series: PFSense Configuration
    • Defensive Lab Series: PFSense Installation
  • IoT pentesting
    • Foundations of IOT
      • IoT Primer for Pentesters – Part 1
      • IoT Primer for Pentesters – Part II
      • IoT Primer for Pentesters – Part III
      • IOT pentesting protocols -Part IV
    • BLE Pentest Series
  • Mobile AppSec
    • iOS-Pentesting
      • iOS IPA Architecture and JailBreak IOS 13.4.1
      • The Anatomy of the iOS file system in Depth -101
      • Build an IOS pentesting lab via XCode Simulator
      • Insecure Data storage Analysis of iOS Applications
      • Build the IPA From Device and IPA Container Analysis
      • Local Data Storage Of iPhone IPA from IOS device
      • Local Storage Analysis of IPA from the pentesting device
      • Decrypting IOS apps Essentials
      • Analyzing the Ipa like a pro
    • Android Pentesting
      • Android Pentesting Lab Setup – 101
      • Android SSL pinning bypass with Frida
      • Creating Rooted AVD in Android Studio
  • Certcube-trainings
    • How to start your career into cyber security
    • offensive CTF
  • Contact Us

Author: MR X

Author | Cybersecurity enthusiast | Corporate trainer | Cybersecurity consultant | Speaker | OSCP | CISA | CCSP | ISO 27001 LA | OSWP | GPEN | GXPN | GCIH
powershell scripts execute without powershell 0

All Blog / AD exploitation & Post exploitation

21st March 2020

Powershell Scripts Execute without Powershell

active directory privilege escalation cheatsheet 0

Windows-Pentesting / AD exploitation & Post exploitation / All Blog

23rd February 2020

Active Directory privilege escalation cheat sheet

awae review 2020 0

All Blog

21st February 2020

AWAE review

Wildcards Injection 0

All Blog / Linux privilege escalation

16th February 2020

Back To The Future: Unix Wildcards Injection

linux kernel exploit list 5

All Blog

27th January 2020

Linux Kernel Exploit list

ssh tunneling 0

Linux privilege escalation / All Blog

8th January 2020

SUDO-LD_PRELOAD Linux Privilege Escalation

log posion 2

OSCP Study material / All Blog

19th December 2019

RCE with log poisoning Attack Methodologies

payload 3

Linux privilege escalation / OSCP Study material

5th December 2019

Msfvenom All in One cheatsheet

suid executables 0

Linux privilege escalation / OSCP Study material

27th November 2019

SUID Executables- Linux Privilege Escalation

pic 0

All Blog

21st November 2019

Well-known Damn Vulnerable Applications

Page 1 of 3123»

Editor Picks

14fi1d

TOP 40 Protocols

23rd February 2023

modern internet concept background 476363 5284

WORKING OF THE WEB

23rd February 2023

Topics List

  • AD exploitation & Post exploitation
  • All Blog
  • buffer overflow
  • cloud Security
  • IoT pentesting
  • Linux privilege escalation
  • mobile application security
  • OSCP Study material
  • web application pentesting
  • Windows-Pentesting

Important Links

  • TOP 40 Protocols
  • WORKING OF THE WEB
  • Headers And IP Message Formats
  • OverTheWire Bandit 1 To 15 Full Write-up
  • BurpSuite Project Options for Pentesters (PART-9)
  • BurpSuite Logger Secrets for Pentesters (PART-8)
  • BurpSuite Decoder Unwrap for Pentesters (PART-7)
  • Burpsuite Sequencer for Pentesters (PART-6)
  • BurpSuite Repeater Recipe for Pentesters (PART-5)
  • BurpSuite Intruder for Pentesters (PART-4)
  • BurpSuite Proxy Configuration for Pentesters (PART-3)
  • Burpsuite Common Terminologies for Pentesters (PART-2)
  • BurpSuite Primer for Pentesters (Beginner’s Edition) – Part 1
  • Android Pentesting Lab Setup – 101
  • Web Application Pentesting Checklist

Recent Comments

  • Top 40 Protocols: A Comprehensive Guide on BurpSuite Primer for Pentesters (Beginner’s Edition) – Part 1
  • Local Plumber on Linux Kernel Exploit list
  • continue reading this on Linux Kernel Exploit list
  • important link on Linux Kernel Exploit list
  • Illuminati Germany on Linux Kernel Exploit list

Archives

  • February 2023
  • January 2023
  • November 2022
  • October 2021
  • August 2021
  • July 2021
  • May 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • May 2019
  • April 2019
  • March 2019

Certcube labs YOUTUBE – lATEST UpDATES

https://www.youtube.com/watch?v=jarAla20knQ&t=37s

detailed updates on mail !

Loading

Categories

  • AD exploitation & Post exploitation (11)
  • All Blog (61)
  • buffer overflow (11)
  • cloud Security (2)
  • IoT pentesting (6)
  • Linux privilege escalation (14)
  • mobile application security (9)
  • OSCP Study material (34)
  • web application pentesting (9)
  • Windows-Pentesting (12)

Recent Comments

  • Top 40 Protocols: A Comprehensive Guide on BurpSuite Primer for Pentesters (Beginner’s Edition) – Part 1
  • Local Plumber on Linux Kernel Exploit list
  • continue reading this on Linux Kernel Exploit list
  • important link on Linux Kernel Exploit list
  • Illuminati Germany on Linux Kernel Exploit list
  • facebook
  • twitter
  • instagram
  • linkedin

CertCube Labs © 2023. All Rights Reserved.

WhatsApp us for trainings & demos