Learn Ethical Hacking
RMI can be run on any nonstandard port and when RMI is running you will observer one more endpoint port connected to it (find it from nm...
#nmap nmap -Pn -sV -p1521 --script=oracle* 10.10.10.10 #Check for service Version #Oracle Database 11g 11.1.0.7, 11.2.0.2, and 11.2.0.3, ...
Basic info About SNMP Ports - 161,162,10161,10162/udp SNMP is a based on UDP, stateless protocol --> susceptible to IP spoofing and...
Before getting into the Attacking and Exploitation, it is recommended to know the difference between vSphere, vCenter and ESXI/ESX hosts.
Egg hunting in 32-bit Windows binary exploitation is a technique used to locate and exploit vulnerabilities in software running on 32-bit ve...
Get shellcode of the binary using objdump objdump -d ./Exit.o|grep '[0-9a-f]:'|grep -v 'file'|cut -f2 -d:|cut -f1-6 -d...
RAX - System Call number RDI - 1st Argument RSI - 2nd RDX - 3rd R10 - 4th R8 - 5th R9 - 6th 64-bit Registers Basic info Accumulator ...
#install libc6-i386 when working on 32bit challenges from 64-bit sudo apt install libc6-i386 # Simple BOF # jmp_address - somewhere at ...