preloader

Blog Grid

  • November 25, 2021

Windows Privilege Escalation: Stored Credentials (Runas)

[ad_1] Microsoft Windows offers a wide range of fine-grained permissions and privileges for controlling access to Windows components including services, files, and

Read More
  • November 25, 2021

Windows Privilege Escalation: Boot Logon Autostart Execution (Startup Folder)

[ad_1] Windows Startup folder may be targeted by an attacker to escalate privileges or persistence attacks. Adding an application to a startup

Read More
  • November 25, 2021

Windows Privilege Escalation: Logon Autostart Execution (Registry Run Keys)

[ad_1] If an attacker finds a service that has all permission and its bind with the Registry run key then he can

Read More
  • November 25, 2021

Powercat for Pentester

[ad_1] IntroductionContents1 Introduction2 Table of Content3 Basic Options in Powercat4 Setting up Powercat5 Port Scanning6 File Transfer7  Bind Shell8 Reverse Shell9 Standalone

Read More
  • November 25, 2021

Windows Privilege Escalation: HiveNightmare

[ad_1] IntroductionContents1 Introduction2 Table of Content3 System protection and creating restore points4 Exploitation Method 1: HiveNightmare.exe (C++ exploit)5 Exploitation Method 2: serioussam.ps1

Read More
  • November 25, 2021

Msfvenom Cheatsheet: Windows Exploitation

[ad_1] In this post, you will learn how to use MsfVenom to generate all types of payloads for exploiting the windows platform.

Read More
  • November 25, 2021

How Hackers Access Server Using Command Injection » TechNoCP

[ad_1] Hi Hackies, Today I am going to introduce a new thing about hacking ‘OS Command Injection’. This is also known as

Read More
  • November 25, 2021

What Is XXE Injection? |How Hackers Do It. » TechNoCP

[ad_1] Hello Hackies, In this article I’ll explain about XML external extity (XXE) injection.This is similar to SQL and HTML injection and

Read More
  • October 19, 2021

Ethical Hacking Hindi Course for Beginner

Training Summary An Ethical Hacker exposes vulnerabilities in software to help business owners fix those security holes before a malicious hacker discovers

Read More
Free Ethical Hacking Course Free