Category: Exploitation


How to exploit blind command injection vulnerability

Command injection: exploitation and automated vulnerability search

How to make changes in browser Developer Tools persist after page reload

sshprank: SSH mass-scanner, login cracker and banner grabber

RDP Security Audit

How to make a local web server accessible from the Internet without a white IP

Pass-the-hash attack (how to use NTLM without cracking a password)

SMB and Samba Security Audit Tools

How to find and analyze information in RAM

How to open and exploit .DS_Store