Penetration testing on MySQL is essential for identifying potential vulnerabilities in one of the most widely used open-source Relational Database Management Systems (RDBMS). MySQL commonly
File transfer in Windows and Linux is a crucial step in post-exploitation scenarios during penetration testing or red teaming. This article provides a complete cheatsheet
WinRM Penetration Testing plays a crucial role in assessing the security of Windows environments. This guide further explores lateral movement, remote shell access, and exploitation
xp_cmdshell command execution is a powerful technique available to penetration testers targeting Microsoft SQL Server environments. Microsoft introduced xp_cmdshell with T-SQL in SQL Server 6.0
We consider Reel a Windows Active Directory machine and a hard box on HTB. This Reel HackTheBox Walkthrough showcases its uniqueness, featuring a phishing scenario
Exploiting Race Condition using Turbo Intruder is a critical technique in web application security. A race condition occurs when multiple threads or processes access shared
Disk Group Privilege Escalation is a complex attack method that targets vulnerabilities or misconfigurations within the disk group management system of Linux environments. Specifically, attackers
Jenkins Penetration Testing is essential for identifying security vulnerabilities in Jenkins, an open-source automation server used for continuous integration (CI) and continuous delivery (CD). Built
Tomcat Penetration Testing is essential for identifying vulnerabilities in Apache Tomcat, a widely used web server and servlet container. Originally, the Apache Software Foundation developed