Difference between revisions of "Main Page"
Line 1: | Line 1: | ||
Follow me on Twitter ([https://twitter.com/BlakSec @BlakSec]). While I might not be saying much, I do follow some interesting folks and sometimes repost interesting industry-related stuff. | Follow me on Twitter ([https://twitter.com/BlakSec @BlakSec]). While I might not be saying much, I do follow some interesting folks and sometimes repost interesting industry-related stuff. | ||
+ | {{Special:NewPages/50}} |
Revision as of 10:50, 2 May 2018
Follow me on Twitter (@BlakSec). While I might not be saying much, I do follow some interesting folks and sometimes repost interesting industry-related stuff.
- 06:31, 30 July 2018 Temple of Doom: 1 ~ VulnHub - CTF Walkthrough (hist) [24,465 bytes] Dmina (talk | contribs) (Created page with "== Objective == Retrieve a flag located inside /root folder Source: https://www.vulnhub.com/entry/temple-of-doom-1,243/ VulnHub.com Status: [<span style="color:red">In P...")
- 13:15, 25 July 2018 Linux Priv Esc Notes (hist) [3,181 bytes] Dmina (talk | contribs) (Created page with "A collection of notes on Linux Privilege Escalation. Some will lead to r00t, some will help moving laterally, all depends on the end-goal. Like most of the content on this sit...")
- 21:30, 17 July 2018 Brute with csrf.py - a quick and dirty fuzzer with CSRF token support (hist) [84 bytes] Dmina (talk | contribs) (Created page with "{{#github:brute_with_csrf.py|blaksec/sectools|master|python}}")
- 06:46, 20 June 2018 W1R3S: 1.0.1 ~ VulnHub - CTF Walkthrough (hist) [11,733 bytes] Dmina (talk | contribs) (Created page with "== Objective == xxxxxxxxxxxxxxxxxxxxx Source: https://www.vulnhub.com/xxxx xxxxxx Status: [<span style="color:green">Completed</span>] == Methodology == === Discovery...")
- 14:04, 12 June 2018 Walkgrhough Template (hist) [1,271 bytes] Dmina (talk | contribs) (Created page with "== Objective == xxxxxxxxxxxxxxxxxxxxx Source: https://www.vulnhub.com/xxxx xxxxxx Status: [<span style="color:green">Completed</span>] == Methodology == xxxxxx <syntax...")
- 06:23, 12 June 2018 Pinky's Palace: v1 ~ VulnHub - Walkthrough (hist) [19,125 bytes] Dmina (talk | contribs) (Created page with "Coming soon!")
- 08:40, 5 June 2018 GetShellCode.py - extract shellcode from a binary (hist) [1,128 bytes] Dmina (talk | contribs) (Created page with "= getShellCode.py = Ok. Before you say anything, there may be quicker ways to extract shell code from a binary, many of them are bash one-liners employing '''grep''', '''cut''...")
- 06:24, 31 May 2018 Bob: 1.0.1 ~ Vulnhub - Walkthrough (hist) [9,942 bytes] Dmina (talk | contribs) (Created page with "== Objective == Get the flag in / Source: https://www.vulnhub.com/entry/bob-101,226/ VulnHub.com Status: [<span style="color:orange">In Progress</span>]")
- 14:59, 30 May 2018 Exploiting web shells - working your way around blacklisted commands (hist) [1,374 bytes] Dmina (talk | contribs) (Created page with "Not so long ago I was working on one of the VulnHub VMs and at one point I stumbled upon a type of web shell. A find like this is a gold mine as it presents an opportunity to...")
- 12:20, 15 May 2018 Enumeration (hist) [277 bytes] Dmina (talk | contribs) (Created page with "Enumeration is a reconnaissance step during which we gather intel on all possible attack vectors. == Enumerating Web == == Enumerating FTP ==")
- 05:23, 15 May 2018 Mr-Robot: 1 ~ VulnHub - Walkthrough (hist) [12,592 bytes] Dmina (talk | contribs) (Created page with "Category:Pentesting == Objective == Source: https://www.vulnhub.com/entry/basic-pentesting-1,216/: VulnHub.com Status: [<span style="color:red">Work in progress</s...")
- 20:00, 10 May 2018 The Ether: EvilScience (v1.0.1) - Walkthrough (hist) [13,356 bytes] Dmina (talk | contribs) (Created page with "Category:Pentesting == Objective == Remotely attack the VM and find all 4 flags eventually leading you to full root access. Source: https://www.vulnhub.com/entry/derpns...")
- 22:48, 4 May 2018 WordPress Plugin - shell.php (variant 1) (hist) [580 bytes] Dmina (talk | contribs) (Created page with "<syntaxhighlight lang=php line> <?php →* * @package My_Shell * @version 1.0: /* Plugin Name: My Shell Plugin URL: http://google.com Description: A quick shell plugin Aut...")
- 22:47, 4 May 2018 Coding projects (hist) [184 bytes] Dmina (talk | contribs) (Created page with "[ WordPress Plugin - shell.php (variant 1) ]")
- 22:17, 2 May 2018 DerpNStink: 1 ~ VulnHub - Walkthrough (hist) [25,381 bytes] Dmina (talk | contribs) (Created page with "Category:Pentesting == Objective == Explore multiple remote vulnerabilities and multiple privilege escalation vectors to gain access to and gain root privileges on the tar...") originally created as "DerpNStink: 1 ~ VulnHub - Walkgrough"