Hello friends! Today we are going to take another CTF challenge known as Bsides London 2017. The credit for making this vm machine goes to
In Part 2 of this article, we have covered Recent Activity, Deleted File Search, Mismatch File Search, Memory Viewer, and Prefetch Viewer. This article will
Introduction to Qemu-img for Virtual Disk Conversion This is a very handy little application. The QEMU team developed it. The software is very useful when
This article is about Post Exploitation using the WMIC (Windows Management Instrumentation Command Line). When an Attacker gains a meterpreter session on a Remote PC,
In this article, we are going to scan the target machine by sending TCP flags through their hexadecimal value and the actual Flag name can
In Part 1 of this article, we have covered Creating case, File Search and Indexing. This article will cover some more features/ functionalities of OS
Kacper Szurek created Burp_wp, an extension of burpsuite that scans and finds vulnerabilities in WordPress plugins and themes using a burpsuite proxy. You can download
In our previous article part1, we had discussed how to perform a brute force attack on any web application server for making unauthorized login into
Introduction Network Address Translation generally involves “re-writing the source and/or destination addresses of IP packets as they pass through a router or firewall” (from http://en.wikipedia.org/wiki/Network_Address_Translation) The Linux kernel