Featured Articles
Chisel with Proxychains
Root an Android Mobile Device
Mobile Application Penetration Testing Cheat Sheet
Cyber Security Analyst Learning Path
Web Attack Cheat Sheet
Social Engineering
Vendor Search
MySQL - 3306 - TCP
PostgreSQL - 5432 - TCP
Web Attack Notes
Web Tools Cheatsheet
Force NTLM Privileged Authentication
Spoofing LLMNR, NBT-NS, mDNS/DNS and WPAD and Relay Attacks
SSH - 22 - TCP
rpcclient - 135 - TCP/UDP
IPMI/RMCP - 623 - UDP/TCP
Decompiling .NET Executables
Reporting
SMTP - 25, 587 - TCP
SNMP - 161, 162, 10161, 10162 - UDP
Tools Commonly Used in Pen Testing
SQLMap
File Transfer Protocol
SMB - 139, 445 - TCP
Open-Source Intelligence
*nix-Based Attack
13 articles
-
Commonalities Among *nix-Based Vulnerabilities
-
Linux Operating System Vulnerabilities
-
Frequently Exploited Linux Features
-
Password Cracking in Linux
-
Linux Service and Protocol Configurations
Active Reconnaissance
13 articles
Anti-Forensic Techniques
3 articles
Attack
15 articles
-
Common Attack Techniques
-
Exploits and Payloads
-
Dictionary Attacks
-
Rainbow Table Attacks
-
Credential Brute Force Attacks
Blue Team
14 articles
-
Identify Security Control Types
-
The Importance of Threat Data and Intelligence
-
The Importance of Security Controls and Security Intelligence - Practice Questions
-
The Importance of Security Controls and Security Intelligence - Performance-based Questions
-
Classify Threats and Threat Actor Types
Code Fortification
13 articles
-
Insecure Coding Practices
-
Static Code vs Dynamic Analysis
-
Fuzzing
-
Reverse Engineering
-
Guidelines for Testing Source Code and Compiled Apps
Cryptography
1 article
Hacking 101
26 articles
-
CLI Quick Notes
-
Cross-Origin Resource Sharing (CORS)
-
Docker Basics
-
Cracking Passwords using John The Ripper
-
Hacking with Hydra — A Practical Tutorial
Lateral Movement
7 articles
-
Lateral Movement
-
Lateral Movement with Remote Access Services
-
Lateral Movement with Remote Management Services
-
Lateral Movement with RPC/DCOM
-
Pivoting
Mobile Penetration Testing
4 articles
-
Android Mobile Application Penetration Testing
-
ADB Shell Commands
-
Mobile Application Penetration Testing Cheat Sheet
-
Root an Android Mobile Device
Network Attack
30 articles
Network Scan & Map
11 articles
OSINT
20 articles
Pen Test Reporting
8 articles
-
Pen Test Data
-
Suggested Solutions
-
Reporting
-
Guidelines for Writing and Handling Reports
-
Client Acceptance & Follow-Up Actions
Pentest
26 articles
-
PenTest+ Study Notes
-
Pen Testing Standards and Frameworks
-
Processes Commonly Used for Pen Testing
-
Communication and the Pen Testing Process
-
Contract Types
Persistence Techniques
7 articles
Physical Security
8 articles
Post-Exploitation
1 article
Reverse Engineering
2 articles
Social Engineering
15 articles
Tools
7 articles
Vulnerability Scanning
21 articles
-
Vulnerability Scan
-
Compliance Scans
-
Host Vulnerability Scans
-
Network Service Vulnerability Scans
-
Web Server and Database Vulnerability Scans
Web App Attack
17 articles
-
Commonalities Among Web Application Vulnerabilities
-
Security Misconfiguration Exploits
-
Authentication Attacks
-
Authorization Attacks
-
Injection Attacks
Windows Attack
24 articles
-
Commonalities Among Windows-Based Vulnerabilities
-
Windows Operating System Vulnerabilities
-
Frequently Exploited Windows Features
-
Password Cracking in Windows
-
Password Cracking Options
Wireless & RF-based Attacks
11 articles