In East Asian cultures, the concept of “face” (reputation and social standing) can be exploited by scammers and sometimes even by government entities. Here’s how this can happen
原创
2024-08-05 11:28:14
58阅读
Installing XSS&MySQL FILE Download the Pentester Lab: XSS and MySQL FILE from the following website: https://www.vulnhub.com/entry/pentester-lab-xss-a
转载
2019-07-17 23:16:00
82阅读
2评论
PIVOTING Use the hacked device as a pivot. Try to gain access to other devices in the network. Tool: Metasploit - AUTOROUTE Module Target: Metasploita
转载
2020-02-07 14:29:00
85阅读
2评论
Spying - Capturing Key Strikes & Taking Screen Shots Log all mouse/keyboard events > keyscan-start - show current working directory > keyscan-dump - l
转载
2020-02-06 20:04:00
65阅读
2评论
MAINTAINING ACCESS - Methods 1. Using a veil-evasion Rev_http_service Rev_tcp_service Use it instead of a normal backdoor. Or upload and execute from
转载
2020-02-06 19:50:00
232阅读
2评论
METERPRETER BASICS >help - shows help >background - backgrounds current session >sessions -I - lists all sessions >session -i - interact with a certai
转载
2020-02-06 17:34:00
55阅读
2评论
Remote File Inclusion[RFI] Prepare: Download the DVWA from the following website and deploy it on your server. http://www.dvwa.co.uk/ Install XAMPP an
转载
2019-07-21 18:46:00
79阅读
2评论
SQL Injection[SQLi] Refrence: SQL Injection Authentication Bypass Cheat Sheet https://pentestlab.blog/2012/12/24/sql-injection-authentication-bypass-c
转载
2019-07-20 10:35:00
289阅读
2评论
Cross-Site Scripting(XSS) 1. Using the tool - netdiscover to find the IP of target server. 2.Browser the website http://10.0.0.21 through Firefox. 3.
转载
2019-07-18 23:23:00
154阅读
2评论
Post-Exploit Password Attacks 1. Crack using the tool - john (Too slow in real world) Locate the rockyou file. Conbine the files and save as unshadow.
转载
2019-07-30 23:38:00
88阅读
2评论
Pivoting 1. Edit the virtual network settings of the Vmware. 2. Set the Network Adapter(s) of Kali Linux, IE8-Win7 and Kioptrix Level 1 as showed in t
转载
2019-07-31 09:27:00
299阅读
2评论
Local File Inclusion[LFI] Target Pentester Lab: Download from the following website: https://www.vulnhub.com/entry/pentester-lab-php-include-and-post-
转载
2019-07-20 22:50:00
96阅读
2评论
Windows Post Exploitation Target Server: IE8-Win 7 VM 1. Download and upload the fgdump, PwDump7, wce and netcat into the IEUser folder on Windows 7.
转载
2019-07-30 21:33:00
311阅读
2评论
Linux Post Exploitation Target Sever: Kioptrix Level 1 1. Search the payloads types. All the payload type in Metasploit are showing as below: 2.Try to
转载
2019-07-29 23:19:00
48阅读
I had gathered an interesting collection of quick methods of blind SQL Injection exploitation, but I was lacking in a similar method for another widespread DBMS – Oracle. It induc
转载
精选
2011-01-17 12:17:34
715阅读
列表中看到。
原创
2023-07-04 15:57:43
49阅读
COMPUTER ORGANIZATION AND ARCHITECTURE DESIGNING FOR PERFORMANCE NINTH EDITION Operating System Design IssuesFull exploitation of a cluster hardware c
转载
2017-01-05 20:27:00
98阅读
Web Exploitation FrameworkSeveral web application security centric frameworks have come and gone that were intended to address this challenge. The goal of Web Exploitation Framework (wXf) is to take t
转载
精选
2015-11-08 22:45:20
1164阅读
Post-exploitation Techniques POST-EXPLOITATION TECHNIQUES What to do once you're in Make it easier next time Lateral movement RPC/DCOM (Remote Procedu
转载
2020-11-03 20:47:00
111阅读
2评论
Windows 漏洞利用:深入解析与实战指南 windows-exploitation My notes while studying Windows exploitation 项目地址: https://gitcode.com/gh_mirrors/wi/windows-exploitation 项目介绍在当今的网络安全领域,Windows操作系统因其广泛的应用而成为攻击者的主要目标。为了帮