Samba can be configured to allow any user with write access the ability to create a link to the root filesystem. Once an atta ...
UnrealIRCd is an open-source IRC server that has been around since 1999 and is perhaps the most widely used one today. Versio ...
So you've managed to get a shell on the target, but you only have measly low-level privileges. Now what? Privilege escalation ...
Post-exploitation information gathering can be a long and drawn-out process, but it is an essential step when trying to pivot ...
Correctly identifying the underlying technologies that run on a website gives pentesters a considerable advantage when prepar ...
SMB (Server Message Block) is a protocol that allows resources on the same network to share files, browse the network, and pr ...
One of the most common web application vulnerabilities is LFI, which allows unauthorized access to sensitive files on the ser ...
One of the first steps in attacking a web application is enumerating hidden directories and files. Doing so can often yield v ...
The art of privilege escalation is a skill that any competent hacker should possess. It's an entire field unto itself, and wh ...
One of the best ways to dig into a website and look for vulnerabilities is by using a proxy. By routing traffic through a pro ...