Post-Exploitation Techniques: Maintaining Access, Escalating Privileges, Gathering Credentials, Covering Tracks
In this article, we explore the essential techniques used during the post-exploitation phase in penetration testing and red teaming. We will demonstrate methods for covering traces within a system, such as modifying log files and timestamps, to evade detection and maintain long-term access for further testing.
Unlocking Windows System Resource Utilization for Digital Forensics Analysis with SRUM Dump
This write-up explains the importance and benefits of using SRUM (System Resource Utilization Management Database) and SRUM Dump tool on Windows Systems from a digital forensics investigation point of view. It can help digital forensics investigators or Information Security professionals understand what criminals did and prove it in a scientific way.
Maximizing IDOR Detection with Burp Suite’s Autorize
This article aims to enhance your ability to detect IDOR vulnerabilities more efficiently and take your discovery process to the next level. Additionally, you will learn how to utilize Autorize, a powerful Burp Suite extension that streamlines the testing process for access control vulnerabilities in web apps.
The Rise and Fall of Sabu: From Hacker Hero to FBI Informant
In this article, we explore the fascinating life of Hector Xavier Monsegur, also known as Sabu, a former member of the hacking collectives Anonymous and LulzSec. Sabu gained notoriety in 2011 for leading a series of high-profile cyber-attacks…
Primer on Broken Access Control vulnerabilities and how to find them
In this write-up, we will be focusing on broken access control vulnerabilities and providing multiple examples of how to detect them.
GoLogin vs. MultiLogin vs. MuLogin: Similarities and Differences for the Best Results
Most browsers are free to use, and it is very convenient for people. However, there is another side of the coin – using something for free on the Internet can be dangerous for your private information and identity.
Major Cyber Attacks of 2022
In this article we discuss the major Cyber Attacks that shaped 2022. You’ll get informed about the top hacking incidents, including breaches, ransomware attacks, hacking campaigns and more.
Operation OpRussia – Anonymous attacks on Russia
In this article we explore some of the attacks that Anonymous did against Russia in response to the Russian invasion in Ukraine.
Identify and Exploit LFI (Local File Inclusion) Vulnerabilities
In this write up, we’ll show you how to identify and exploit LFI Vulnerabilities. We will also discuss their impact and how to mitigate them with examples.