-
Building a Slack Bot with Python
The slack bot that I will be building has a feature that will automatically fetch the latest tweets from my subscribed lists (Information Security related) on Twitter. Thanks to this guide I was ab… -
Hack the Box Legacy Get System no Jutsu
This post contains the actual commands that I used in hacking and getting the user and root hashes on HTB Legacy Box. Enumeration kaipowered@debian:~/Downloads/enum4linux-0.8.9/enum4linux-0.8.9$ su… -
Vulnhub SkyDog 2016 – Catch Me If You Can
The SkyDogConCTF is one of the most enjoyable CTF challenges that I have ever played because it contained a lot of twists and challenges that don’t need advanced exploitation techniques … -
Vulnhub Tr0ll 1
Started with the Nmap Scan # Nmap 7.40 scan initiated Thu Aug 3 20:58:47 2017 as: nmap -sC -sV -oA nmap 192.168.8.102 Nmap scan report for 192.168.8.102 Host is up (0.0035s latency). Not shown: 997… -
Phases of Penetration Testing
Penetration Testing or Pentesting is a process where the testers will assess and discover the vulnerabilities that are present in a network or system and will exploit these vulnerabilities to gain …
subscribe via RSS