A couple of days ago I took the exam for the CRTP certification by Pentester Academy. In this review I want to give a quick overview of the course contents, ...
Write-up of “Buff” from Hack The Box
Write-up of “Tabby” from Hack The Box
Write-up of “Fuse” from Hack The Box
To boot Linux without Data Execution Prevention, so that the OS doesn’t mark certain memory regions as non-executable, we…
How unpickling untrusted data can lead to remote code execution.
Write-up of “Bart” from Hack The Box
Write-up of “Kotarak” from Hack The Box
Write-up of “TartarSauce” from Hack The Box
Write-up of “Cronos” from Hack The Box
Write-up of “Netmon” from Hack The Box
Using the Invoke-Command Cmlet, you can execute a script block in the security context of a different user.
Write-up of “Networked” from Hack The Box
Write-up of “Jerry” from Hack The Box
If you want to debug/inspect/analyze SSL/TLS traffic made by curl, you can easily do so by setting the environment variable SSLKEYLOGFILE to a file path of y...
Pivot by setting up a portproxy between your machine and a machine in another network using “netsh interface portproxy add v4tov4 listenport= connectport= co...
Setting up a DNS tunnel and SOCKS proxy to send/receive data via restricted networks.
Have you ever wondered how a file in a file listing is shown with size 0 bytes but can still contain data? Or maybe wondered where all that meta data is stor...