In this article, we will learn how we can Examine Corrupted File Extension to identify the basic file header in a Forensic Investigation. Let’s understand
In this article, we will run a couple of CLI commands that help a forensic investigator to gather volatile data from the system as much
Grabbing a banner is the first and apparently the most important phase in both the offensive and defensive penetration testing environments. In this article, we’ll
Today, I am going to share a writeup for the boot2root challenge of the vulnhub machine “Tre:1”. It is made by SunCSR team difficulty level
In this deep down online world, dynamic web-applications are the ones that can easily be breached by an attacker due to their loosely written server-side
Today we are going to solve another boot2root challenge called “GitRoot: 1”. It’s available at Vulnhub for penetration testing. This lab is an intermediate level
Today we are going to solve another boot2root challenge called “Glasgow Smile”. It’s available at Vulnhub for penetration testing. This lab is an intermediate level.
In this post, we are going to discuss how we can abuse Kerberos protocol remotely using Python libraries “Impacket” for conducting the lateral movement attack.
In this post, we are going to discuss how we can connect to Victims machine remotely using Python libraries “Impacket” which you can download from