Learn Ethical Hacking
# Open a file with GDB gdb ./file #quite gdb -q .file #run the process r run #run a process r 127.0.0.1 -c 1 #run PID; -q is for quiet...
Hello all, This is a simple cheat sheet for Hacking/Pentesting Captive Portals Enabled Wireless/Wifi networks Before Starting the attack, i...
RPC Ports 135/tcp open msrpc Microsoft Windows RPC 139/tcp open netbios-ssn Microsoft Windows netbios-ssn 445/tcp open...
SMB Enumeration smbmap -H 10.10.10.10 //Check Privileges smbmap -H 10.10.10.10 -R --depth 5 smbclient -L //10.10.10.10/ ...
What is DPAPI ? According to wiki, DPAPI (Data Protection Application Programming Interface) is a simple cryptographic application programm...
Linux Capabilities are used to allow binaries (executed by non-root users) to perform privileged operations without providing them all roo...
Here is another continuation of Active Directory Penetration Testing cheatsheet, this time - I am putting together few of the common relay...
There is no doubt that Mac offers seamless operations and smoothness that very few other brands can deliver to escalate your convenience. Ho...