TECHNICAL HTB Investigation Walkthrough Explore the world of reverse engineering with our HTB Investigation Walkthrough, as we navigate layered security and unveil critical cyber strategies, from masterful enumeration to deft privilege escalation.
TECHNICAL HTB Noter Walkthrough Master the art of flask cookie forging and exploit the power of MySQL in this comprehensive Hack The Box Noter Walkthrough.
TECHNICAL RKE: How To Hack A Car Remote Keyless Entry (RKE) systems are basically radio remote controls capable of making a car open or close its doors, and even start the engine.
TECHNICAL AP Faker: Arduino project The purpose of this educational project is to create a fake Access Point that can blend in alongside a public Access Point.
TECHNICAL HTB Trick Walkthrough A technical walk through of the HackTheBox TRICK challenge by Andy from Italy.
TECHNICAL Getting started with the MITRE ATT&CK Framework MITRE ATT&CK is a knowledge base of adversary tactics and techniques based on real-world observations.
TECHNICAL HTB Shibboleth Walkthrough A technical walkthrough of the HackTheBox SHIBBOLETH challenge from the King of HTB Andy From Italy.
TECHNICAL Windows Post Exploitation - WDigest Credentials Cache Learn how to enable WDigest credential caching and Metasploit to retrieve the plain text password of logged-in users.
TECHNICAL HTB Late Walkthrough A technical walkthrough of the HackTheBox LATE challenge from the King of HTB Andy From Italy.
TECHNICAL The JWT and Base64 Secrets You Need To Know Welcome to my guide to the JWT and Base 64 secrets you absolutely need to know if you hack.
TECHNICAL Defender Bypass With .PIF Extensions Learn a new method for bypassing Windows Defender security mechanisms using PIF extensions.
TECHNICAL Windows Post Exploitation & Clipboard Manipulation A lab exercise in Windows post exploitation techniques, covering manipulation of the clipboard.
TECHNICAL HTB OpenSource Walkthrough Andy From Italy is back with another epic HackTheBox walkthrough, this time he takes on the OpenSource box.
TECHNICAL Windows Post Exploitation - Create Files and Log Keystrokes Learn how to create files on the target machine using meterpreter, change the file timestamps, and log key strokes on the target system.
TECHNICAL HTB RouterSpace Walkthrough Andy from Italy is back with another HackTheBox technical writeup, this time he takes on the Routerspace.
TECHNICAL Windows Post Exploitation - Enabling WinRM Learn how to access a vulnerable application, even if the initial application vulnerability is patched.
TECHNICAL HTB Undetected Walkthrough A technical walkthrough of the HackTheBox undetected challenge, by Andy From Italy.
TECHNICAL HTB Pandora Walkthrough A technical walkthrough of the HackTheBox Pandora challenge, by HTB Legend Andy From Italy.
TECHNICAL CVE-2022-24112 Exploiting HTTP Request Smuggling Header smuggling is the art of running commands on the target server by playing around with HTTP headers.
TECHNICAL HTB Paper Walkthrough A technical walkthrough of the HackTheBox Paper challenge, by Andy From Italy.
TECHNICAL HTB Unicode Walkthrough A technical walkthrough of the HackTheBox Unicode challenge, by Andy From Italy.
TECHNICAL HTB Backdoor Walkthrough Andy From Italy is back with another solid HackTheBox technical write up, this time he heads for the BACKDOOR.
TECHNICAL Funny Deadly Linux Strings Part 2 Security researcher Patrick Hoogeveen returns with part two of his series on deadly little Linux strings.
TECHNICAL HTB Devzat Walkthrough A technical walk through of the HackTheBox DEVZAT challenge, by Andy From Italy.
TECHNICAL HTB Driver Walkthrough A technical walk through of the HackTheBox DRIVER challenge, by Andy From Italy.