Wednesday , May 20 2020
Home / Tag Archives: Kali

Tag Archives: Kali

Privilege Escalation in Metasploitable 2 Machine

privilege escalation in metasploitable 2 machine

After a break of months, I finally urged myself to start writing information security blogs again. Hope, I do my best to deliver a valuable information to my readers. This time I’d be starting with writing walkthroughs and privilege escalation of vulnerable machines / capture the flag (CTF). I picked …

Read More »

Pakistan First OSCE Certified

Pakistan First OSCE Certified

Etizaz Mohsin is Pakistan first OSCE Certified who successfully achieved Offensive Security Certified Expert Certification (OSCE) along with Offensive Security Certified Professional Certification (OSCE). Read more about him. OSCE Pakistan – OSCE in Pakistan – Pakistan first OSCE – First OSCE in Pakistan – Pakistan OSCE Overview Offensive Security Certified …

Read More »

OSCP / PWK Exam Review

oscp review by aitezaz mohsin

Overview Offensive Security Certified Professional Certification is self proclaimed to be the first hands-on offensive information security certification, built and designed to challenge OSCP students to prove they have a clear and practical understanding of the penetration testing process and life-cycle. An Offensive Security Certified Professional (OSCP) has to go …

Read More »

Linux Essential Root Subdirectories

linux essential root subdirectories

In this article, let us review the Linux filesystem structures (linux essential root subdirectories) and understand the meaning of individual high-level directories. root contains every single file and directory starts from the root directory. Only root user has write privilege under this directory. bin contains binary programs (also known as …

Read More »

After NSA hacking expose, CIA staffers asked where Equation Group went wrong

NSA hacking expose

Two days after researchers exposed a¬†National Security Agency-tied hacking group that operated in secret for more than a decade, CIA hackers convened an online discussion aimed at preventing the same kind of unwelcome attention. The thread, according to a document WikiLeaks published Tuesday, was titled “What did Equation do wrong, …

Read More »

Exploit with OS Command Injection

OS command injection is an attack in which the goal is execution of arbitrary commands on the host operating system via a vulnerable application. Command injection attacks are possible when an application passes unsafe user supplied data (forms, cookies, HTTP headers etc.) to a system shell. the attacker-supplied operating system …

Read More »

Bypass HTTP Basic Authentication with Nmap and Metasploit

Bypass HTTP Basic Authentication

Basic HTTP authentication is a method for providing username and password when making a request for particular web resources. The client sends the user name and password as unencrypted base64 encoded text. When an anonymous request for protected resource is received by HTTP, it can force the use of Basic …

Read More »

Responsive WordPress Theme Freetheme wordpress magazine responsive freetheme wordpress news responsive freeWORDPRESS PLUGIN PREMIUM FREEDownload theme free