Learn Ethical Hacking

[Ethical Hacking][bsummary]
latest posts

Exploiting VulnServer - KSTET - Egg Hunting - Windows Binary Exploitation

Egg hunting in 32-bit Windows binary exploitation is a technique used to locate and exploit vulnerabilities in software running on 32-bit ve...

Shellcodes for Binary Exploitation

  Get shellcode of the binary using objdump objdump -d ./Exit.o|grep '[0-9a-f]:'|grep -v 'file'|cut -f2 -d:|cut -f1-6 -d&#...

64-bit Binary Exploitation Cheatsheet

  RAX - System Call number RDI - 1st Argument RSI - 2nd RDX - 3rd R10 - 4th R8 - 5th R9 - 6th 64-bit Registers Basic info Accumulator ...

32-bit Binary Exploitation Cheatshet

  # Simple BOF # jmp_address - somewhere at the start of NOPS NOPS + shellcode + A*(EBP_offset-len(shellcode)) + jmp_address #When you hav...

Binary Exploitation Cheatsheet

  ELF INFO #Hex to Decimal printf "%d\n" 0x18 #Get ELF headers readelf -h hello_world #Get Program Headers - 9 Headers readelf...

IPMI Pentest Cheatsheet - Port 623

Intelligent Platform Management Interface ( IPMI) is a hardware-based system management and monitoring tool that is widely used by sysadmins...

GDB Commands Cheatsheet

  # Open a file with GDB gdb ./file #quite gdb -q .file #run the process r run #run a process r 127.0.0.1 -c 1 #run PID; -q is for quiet...

Hacking and PenTesting Captive Portal Enabled Wireless Networks

 Hello all, This is a simple cheat sheet for Hacking/Pentesting Captive Portals Enabled Wireless/Wifi networks Before Starting the attack, i...

Cheat Sheets

[Cheatsheet][grids]

Learn Hacking Wifi Networks

[How To Hack Wifi][grids]