TECHNICAL Attack Defense: Windows Basic Exploitation #11 Learn to exploit a vulnerable windows service WinRM using Powershell.
TECHNICAL HTB Cap Challenge Walkthrough In this article, Gurkirat Singh gives us a technical walkthrough of the HackTheBox Cap challenge!
TECHNICAL A Python Regular Expression Bypass Technique Sometimes, functions included in Python RE are misused by developers and when you see this it can be possible to bypass weak input validation functions.
TECHNICAL HTB Armageddon Walkthrough A technical walk-through of the HackTheBox Armageddon challenge.
TECHNICAL VulnHub VulnOS2 Walkthrough A comprehensive technical walkthrough of the VulnHub VulnOS2 challenge.
TECHNICAL HTB Breadcrumbs Walkthrough A technical walk-through of the HackTheBox Breadcrumbs challenge.
TECHNICAL Attack Defense: Windows Basic Exploitation #9 Learn how to exploit the NodeJS debug server and gain a foothold on the target system.
TECHNICAL Nmap MS-SQL Server Recon Learn how to conduct recon missions against MS-SQL server using Nmap.
TECHNICAL Blue Team Detection: nJRat Cybersecurity engineer Charlie Crane on detecting malware by its behaviors which are relatively persistent and common across many malware flavors.
TECHNICAL HTB Delivery Walkthrough Resident HTB specialist Andy From Italy returns to crack another challenge, this time he takes on the Delivery box.
TECHNICAL How to Hack An Insecure Web App: OWASP WebGoat Challenge (Part 2) Mars Groves teaches us how to steal credit cards from a database as part of the OWASP WebGoat challenge.
TECHNICAL Attack Defense: Windows Basic Exploitation #8 Part 8 of our popular attack/defense series on basic windows exploitation.
TECHNICAL Attack Defence: Windows Basic Exploitation #7 In this article, you will learn how to exploit an OSGi Console using metasploit and gain access to your target system.
TECHNICAL Understanding Linux Cron Jobs Understanding the tole of Linux cron jobs and how they can help you during penetration tests.
TECHNICAL Hacking GraphQL for Fun and Profit (2): Methodology & Examples Part two of our popular series on hacking GraphQL for Fun and profit. In this article we focus on the methodology.
TECHNICAL Recon Basics: Tornado Webserver Tornado is a python webserver framework developed by FriendFeed. It can scale to tens of thousands of open connections, making it ideal for WebSockets.
TECHNICAL Attack Defence: Windows Basic Exploitation #6 Learn how to exploit CGI Servlet in Apache Tomcat in part six of basic windows exploitation.
TECHNICAL Client-Side Encryption Bypass (2) Part two in Sameer Bhatt's series on client-side encryption bypass.