Learn Ethical Hacking

[Ethical Hacking][bsummary]
latest posts

Pentesting Oracle TNS listener/ Database - Chaeatsheet - Port 1521

  #nmap nmap -Pn -sV -p1521 --script=oracle* 10.10.10.10 #Check for service Version #Oracle Database 11g 11.1.0.7, 11.2.0.2, and 11.2.0.3, ...

SNMP Pentest Cheatsheet - Port 161

  Basic info About SNMP Ports - 161,162,10161,10162/udp SNMP is a based on UDP, stateless protocol --> susceptible to IP spoofing and...

Attacking and Pentesting VMWare ESXi Hosts

 Before getting into the Attacking and Exploitation, it is recommended to know the difference between vSphere, vCenter and ESXI/ESX hosts. 

Exploiting VulnServer - KSTET - Egg Hunting - Windows Binary Exploitation

Egg hunting in 32-bit Windows binary exploitation is a technique used to locate and exploit vulnerabilities in software running on 32-bit ve...

Shellcodes for Binary Exploitation

  Get shellcode of the binary using objdump objdump -d ./Exit.o|grep '[0-9a-f]:'|grep -v 'file'|cut -f2 -d:|cut -f1-6 -d&#...

64-bit Linux Binary Exploitation Cheatsheet

  RAX - System Call number RDI - 1st Argument RSI - 2nd RDX - 3rd R10 - 4th R8 - 5th R9 - 6th 64-bit Registers Basic info Accumulator ...

32-bit Linux Binary Exploitation Cheatsheet

  #install libc6-i386 when working on 32bit challenges from 64-bit sudo apt install libc6-i386 # Simple BOF # jmp_address - somewhere at ...

Binary Exploitation Cheatsheet

  ELF INFO #Check protections rabin2 - I binary checksec binary #Hex to Decimal printf "%d\n" 0x18 #Get ELF headers readelf -...

Cheat Sheets

[Cheatsheet][grids]

Learn Hacking Wifi Networks

[How To Hack Wifi][grids]