Learn Ethical Hacking

[Ethical Hacking][bsummary]
latest posts

GDB Commands Cheatsheet

  # Open a file with GDB gdb ./file #quite gdb -q .file #run the process r run #run a process r 127.0.0.1 -c 1 #run PID; -q is for quiet...

Hacking and PenTesting Captive Portal Enabled Wireless Networks

 Hello all, This is a simple cheat sheet for Hacking/Pentesting Captive Portals Enabled Wireless/Wifi networks Before Starting the attack, i...

RPC Pentest Checklist

  RPC Ports 135/tcp open msrpc Microsoft Windows RPC 139/tcp open netbios-ssn Microsoft Windows netbios-ssn 445/tcp open...

SMB Pentest Checklist

  SMB Enumeration smbmap -H 10.10.10.10 //Check Privileges smbmap -H 10.10.10.10 -R --depth 5 smbclient -L //10.10.10.10/ ...

Abusing DPAPI using Mimikatz

What is DPAPI ?  According to wiki, DPAPI (Data Protection Application Programming Interface) is a simple cryptographic application programm...

Breaking Out of Containers - Exploiting Sys_Module Capability

  Linux Capabilities are used to allow binaries (executed by non-root users) to perform privileged operations without providing them all roo...

Relay Attacks - Active Directory Penetration Testing

  Here is another continuation of Active Directory Penetration Testing cheatsheet, this time - I am putting together few of the common relay...

5 Mac Hacks to Make it Feel More Like a PC

There is no doubt that Mac offers seamless operations and smoothness that very few other brands can deliver to escalate your convenience. Ho...

Cheat Sheets

[Cheatsheet][grids]

Learn Hacking Wifi Networks

[How To Hack Wifi][grids]