What is DLL Hijacking and How to Prevent it?In this article, we will explore DLL Hijacking, and how attackers use it for privilege escalation in Windows. We will also explore how to…Oct 3, 20235Oct 3, 20235
Published inInfoSec Write-upsCreate Bind and Reverse Shells using NetcatNetcat (nc, ncat, or the swiss army knife of networking, as some might prefer to call it) is a command-line utility that every…Apr 18, 202228Apr 18, 202228
Published inInfoSec Write-upsServer-Side Request Forgery (SSRF) ExplainedServer-Side Request Forgery (or SSRF) is an attack that consists of inducing a web application to send back-end requests to an unintended…Apr 8, 2022161Apr 8, 2022161
Published inInfoSec Write-upsHost Header Injection AttacksHost Header injection is not the type of attack that you would normally find in CTFs or security challenges. However, it is widespread in…Feb 5, 2022361Feb 5, 2022361
HTTP Request Smuggling ExplainedHTTP Request Smuggling ( HRS) is a type of attack that is gaining more and more attention in recent years. Its rise is fueled by the high…Dec 31, 2021131Dec 31, 2021131
Published inInfoSec Write-upsXXE Attacks ExplainedOut of the many attacks that threaten web applications today, XXE remains the one that is talked about the least. Although it gets far less…Dec 12, 202127Dec 12, 202127
CSRF (Cross-Site Request Forgery) ExplainedCross- Site Request Forgery (CSRF or XSRF), also called Client-Side Request Forgery, is a type of attack that targets web applications. It…Nov 28, 20214Nov 28, 20214
Published inCodeXA Quick Guide To Regular ExpressionsRegular expressions are present in almost all programming languages (Python, PHP, Javascript…), as well as in Linux commands (grep, sed…)…Sep 26, 202150Sep 26, 202150
Published inGeek CultureIntroduction to Cross-Site Scripting (XSS)This article presents a great introduction for anyone trying to learn about Cross-Site Scripting (or XSS). You don’t need to be an expert…Aug 13, 202176Aug 13, 202176
Published inCodeXUsing THC Hydra To Brute Force Login FormsTHC Hydra is a powerful tool to use against login forms. It can perform brute force and dictionary attacks against different types of…Aug 6, 202133Aug 6, 202133
Published inCodeXLinux Privilege Escalation — Three Easy Ways to Get a Root ShellOnce you’ve gained access to a Linux system, the next logical step is to perform privilege escalation. That is, to go from a user account…Jul 30, 2021Jul 30, 2021
Using John The Ripper To Crack Password HashesEvery self-respecting pentester should have a powerful password cracker in their toolkit, and John the Ripper is simply the best cracker…Jun 29, 2021Jun 29, 2021
Using Gobuster to Find Hidden Web ContentDirectories and Files enumeration is one of the first steps that an attacker performs during web application pentesting.Apr 20, 2021Apr 20, 2021
Introduction to SQL Injection — SQL Injection for BeginnersThis article is aimed at complete beginners who do not have any knowledge about SQL injection.Apr 9, 20211Apr 9, 20211
Introduction to Malware Analysis — Malware ExplainedIn this story, we will try to learn what malware is and how malware analysis works. This is aimed at complete beginners who have never…Mar 9, 2021Mar 9, 2021
How To Use Nmap: A Beginner’s GuideNmap is an open-source network mapping tool developed by Gordon Lyon. It is widely used as a port scanner and a host discovery tool by…Jan 19, 2021Jan 19, 2021
Overthewire — Learn Hacking By Playing GamesIf you’ve spent enough time on the web searching for practical resources to learn how to hack, then you should know by now what a hustle…Jan 13, 2021Jan 13, 2021
Google Dorks Explained — Google HackingIn this post, I will explain what google dorks are. I will also provide you with examples of how hackers employ them to access sensitive…Jan 7, 2021Jan 7, 2021
How to Design a Computer Network for a CompanyYou had just gotten a job at a respectable firm. A client came up to you and asked you to design a computer network for his company. He…Jan 4, 2021Jan 4, 2021
How to Become an Ethical Hacker (Step-by-step Guide)Any person who is seriously considering to become an ethical hacker should be aware of the challenges they might face. If you think that…Jan 1, 20211Jan 1, 20211