TECHNICAL TryHackMe Mr. Robot CTF Writeup Gurkirat Singh publishes his final write-up for 2021 on the TryHackMe Mr. Robot CTF, and demonstrates how to get root access into the Mr. Robot room and more!
TECHNICAL TryHackMe Bounty Hacker Write-up Gurkirat Singh pushes out another one of his final TryHackMe write-ups for the year 2021 based on the room called Bounty Hacker! He shares how you can exploit the sudo misconfiguration when there's a password reusable vulnerability in the system and more!
TECHNICAL TryHackMe Road Challenge Walkthrough A detailed walkthrough on Linux privilege escalation with the TryHackMe web-to-root machine named Road.
TECHNICAL Attack Defense: Windows Basic Exploitation #11 Learn to exploit a vulnerable windows service WinRM using Powershell.
Attack Defense: Windows Basic Exploitation #10 Apache Tika is a toolkit that detects and extracts metadata and text from over a thousand different file types.
TECHNICAL HTB Cap Challenge Walkthrough In this article, Gurkirat Singh gives us a technical walkthrough of the HackTheBox Cap challenge!
TECHNICAL VulnHub VulnOS2 Walkthrough A comprehensive technical walkthrough of the VulnHub VulnOS2 challenge.
TECHNICAL Attack Defense: Windows Basic Exploitation #9 Learn how to exploit the NodeJS debug server and gain a foothold on the target system.
INFOSEC Secjuice Squeeze 67 Welcome to the Secjuice Squeeze, a curated selection of interesting security articles and infosec news that you may have missed, lovingly curated for you every week.
TECHNICAL Nmap MS-SQL Server Recon Learn how to conduct recon missions against MS-SQL server using Nmap.
INFOSEC Secjuice Squeeze 65 Welcome to the Secjuice Squeeze, a curated selection of interesting security articles and infosec news that you may have missed.
TECHNICAL Attack Defense: Windows Basic Exploitation #8 Part 8 of our popular attack/defense series on basic windows exploitation.
INFOSEC Secjuice Squeeze 64 Welcome to the Secjuice Squeeze, a lovingly curated selection of interesting security articles and infosec news that you may have missed.
TECHNICAL Attack Defence: Windows Basic Exploitation #7 In this article, you will learn how to exploit an OSGi Console using metasploit and gain access to your target system.
TECHNICAL Understanding Linux Cron Jobs Understanding the tole of Linux cron jobs and how they can help you during penetration tests.
TECHNICAL Recon Basics: Tornado Webserver Tornado is a python webserver framework developed by FriendFeed. It can scale to tens of thousands of open connections, making it ideal for WebSockets.
INFOSEC Secjuice Squeeze 62 Welcome to the Secjuice Squeeze, a lovingly curated selection of interesting security articles and infosec news that you may have missed.
INFOSEC Secjuice Squeeze 61 Welcome to the Secjuice Squeeze, a lovingly curated selection of interesting security articles and infosec news that you may have missed.
TECHNICAL Attack Defence: Windows Basic Exploitation #6 Learn how to exploit CGI Servlet in Apache Tomcat in part six of basic windows exploitation.
Nginx Recon Basics Part two of Gurkirat Singh's series on web server reconnaissance, this time focusing on the Nginx web server.
TECHNICAL Gunicorn Recon Basics Part three of Gurkirat Singh's series on web server reconnaissance, this time focusing on Gunicorn.
TECHNICAL Recon Basics: Apache Server A writeup of the Attatck/Defence lab for learning Apache webserver recon.
TECHNICAL Attack Defence: Windows Basic Exploitation #5 Part five in our series on basic windows exploitation, in this episode we focus on exploiting the Apache Tomcat webserver.
TECHNICAL Attack Defence: Windows Basic Exploitation #4 Hello everyone, I have returned to tackle part four of my series on Windows exploitation, in this episode you will learn how to exploit Process Builder utility to gain access to windows environment.