In the previous article, we have seen some methods to Analyze the Traffic of Thick Client Applications specifically in DVTA. You can take a look
Traffic analysis is one of the crucial parts of any successful penetration test. In this article, we’re going to discuss some of the different techniques
We will shine the light on the process or methodology for enumerating SMB services on the Target System/Server in this article. There are numerous tools
It’s very hard for a bug bounty hunter or a web application pentester to remember all the codes or to search for different payloads by
Nmap Scripting Engine (NSE) has been one of the most efficient features of Nmap, which lets users prepare and share their scripts to automate the
This is the second instalment of our series comprehensive guide on dirsearch. In the first part of this series, we discussed some basic commands on
Hello Pentesters, today, in this article we are going to learn about the concept of WebDAV. We will also see how to set up the
In the previous article, we have discussed the reverse engineering of original DVTA application in the Lab setup of Thick Client: DVTA part 2 In
In this article, we will learn how we can use Dirsearch. A developer designed a simple command-line tool to brute force directories and files in