Cybertech MaveninInfoSec Write-upsCreating Payloads with ScareCrow to Mimic Reputable Sources and Bypass Anti-VirusThis write-up discusses using ScareCrow to create payload frameworks for side loading (not injecting) into a legitimate Windows process…6 min read·Apr 13, 2024--1--1
Cybertech MaveninThe Gray AreaConcealing a RAT Within a File to Compromise a Windows SystemThis write-up will discuss how a Windows machine can be hacked by embedding a Remote Access Trojan (RAT) inside a file. This will enable…7 min read·Dec 11, 2023--3--3
Cybertech MaveninSystem WeaknessUnveiling the Mechanics of Session Hijacking: A Step-by-Step Guide to Capture and Exploit Cookies9 min read·Nov 18, 2023----
Cybertech MaveninInfoSec Write-upsOn Path Attacks: File Transfer Capture with Ettercap and WiresharkWe can intercept SMB file transfers by assuming an on-path position between targets.·5 min read·Oct 20, 2023----
Cybertech MaveninThe Gray AreaCredential Stuffing Attack— How to Brute Force a Website that is CAPTCHA-ProtectedFor educational purposes, I will demonstrate how to conduct a credential stuffing attack on a demo website that reCAPTCHA protects.·10 min read·Sep 18, 2023----
Cybertech MaveninSystem WeaknessHow to Use Lynis for System Vulnerability ScanningIntroduction3 min read·Sep 8, 2023----
Cybertech MaveninInfoSec Write-upsIntroduction to OpenVAS — A Vulnerability ScannerKali Linux provides a tool named the Open Vulnerability Assessment System (OpenVAS) for vulnerability scanning of the system on a network…4 min read·Aug 28, 2023----
Cybertech MaveninInfoSec Write-upsNikto Introduction — Web Application Security3 min read·Aug 23, 2023----
Cybertech MaveninSystem WeaknessHow to use Netsniff-ng and Wireshark in Kali Linux to Capture Login CredentialsIntroduction·5 min read·Aug 18, 2023--2--2