Learn Ethical Hacking

[Ethical Hacking][bsummary]
latest posts

Java JMX RMI Pentest Cheatsheet

    RMI can be run on any nonstandard port and when RMI is running you will observer one more endpoint port connected to it (find it from nm...

Pentesting Oracle TNS listener/ Database - Chaeatsheet - Port 1521

  #nmap nmap -Pn -sV -p1521 --script=oracle* 10.10.10.10 #Check for service Version #Oracle Database 11g 11.1.0.7, 11.2.0.2, and 11.2.0.3, ...

SNMP Pentest Cheatsheet - Port 161

  Basic info About SNMP Ports - 161,162,10161,10162/udp SNMP is a based on UDP, stateless protocol --> susceptible to IP spoofing and...

Attacking and Pentesting VMWare ESXi Hosts

 Before getting into the Attacking and Exploitation, it is recommended to know the difference between vSphere, vCenter and ESXI/ESX hosts. 

Exploiting VulnServer - KSTET - Egg Hunting - Windows Binary Exploitation

Egg hunting in 32-bit Windows binary exploitation is a technique used to locate and exploit vulnerabilities in software running on 32-bit ve...

Shellcodes for Binary Exploitation

  Get shellcode of the binary using objdump objdump -d ./Exit.o|grep '[0-9a-f]:'|grep -v 'file'|cut -f2 -d:|cut -f1-6 -d&#...

64-bit Linux Binary Exploitation Cheatsheet

  RAX - System Call number RDI - 1st Argument RSI - 2nd RDX - 3rd R10 - 4th R8 - 5th R9 - 6th 64-bit Registers Basic info Accumulator ...

32-bit Linux Binary Exploitation Cheatsheet

  #install libc6-i386 when working on 32bit challenges from 64-bit sudo apt install libc6-i386 # Simple BOF # jmp_address - somewhere at ...

Cheat Sheets

[Cheatsheet][grids]

Learn Hacking Wifi Networks

[How To Hack Wifi][grids]