Published inSystem WeaknessBypassing Aquatone’s lack of ability to take screenshots of private websitesNot really for an info gathering assessment, but this trick helped me recently a lot. For reasons that are not relevant, I needed to take a…Apr 30, 2024Apr 30, 2024
Published inSystem WeaknessAutomating CVE searchI was recently automating the search for CVEs affecting some assets. A real life saver for automating this process is to use CPE codes…Oct 25, 20231Oct 25, 20231
Published inSystem WeaknessBurp extensions creation #1Quick access: #1, #2, #3,Nov 21, 2022Nov 21, 2022
Published inSystem WeaknessBurp extensions creation #2Difference between Python and JythonNov 21, 2022Nov 21, 2022
Published inSystem WeaknessOSWP course review (2022)A couple of months ago I finished OSWP and wanted to share an honest but brief and straight-to-the-point review.Sep 13, 20221Sep 13, 20221
Published inSystem WeaknessOpenVAS docker container setup (Working 2022, all NVTs)I needed to scan a lot of IPs with OpenVAS for an assignment and it proved to be a very painful experience. I had some limitations, since I…May 11, 20222May 11, 20222
Published inSystem WeaknessPlaying with Kerberos tickets (Host service)I’m going to share the results of some experimentation with Kerberos tickets. I’m sorry if this doesn’t add any new value or someone else…Jan 12, 2022Jan 12, 2022
Published inInfoSec Write-upsCTF Write-Up: StackOverflowCTF challenge available at ctf-mystiko.com.Jan 9, 2022Jan 9, 2022
Published inSystem WeaknessTask Scheduler for hackersTo complete a triad of posts on Windows management tools that are sometimes abused for privilege escalation or pivoting I am writing this…Jan 9, 2022Jan 9, 2022
Published inInfoSec Write-upsCTF Write-Up: KryptoniteCTF challenge available at ctf-mystiko.com.Dec 29, 2021Dec 29, 2021
Published inSystem WeaknessWindows Credential Manager for hackersWindows can store credentials for easy reuse. There are several ways to access them. In principle a user can see that there are credentials…Dec 15, 2021Dec 15, 2021
Published inSystem WeaknessRunas for hackersPlease, refer to the post on Credential Manager if you are interested in seeing how to manage stored credentials in windows. This will be…Dec 15, 2021Dec 15, 2021