Menu

Exploitation

Exploitation is the next step in a hacker's playbook after finding a vulnerability, mostly used to gaining unauthorized access or information
How to Create a Linux Botnet Step by Step with BYOB
How to Create a Linux Botnet Step by Step with BYOB

BYOB is a project made with Python offering security researchers and developers a structure to build and operate a simple botnet to deepen their understanding [...]

BYOBBotnetPythonLinuxMalwareTrojab
What is a Buffer Overflow and How Hackers Exploit these Flaws Part 3
What is a Buffer Overflow and How Hackers Exploit these Flaws Part 3

In our previous article we have seen how to change variables or either execute functions which should not be done through a stack buffer overflow and few more [...]

BufferOverflowProgramMemoryBinaryCrash
What is a Buffer Overflow and How Hackers Exploit these Flaws Part 2
What is a Buffer Overflow and How Hackers Exploit these Flaws Part 2

In our previous article we talked about the basics such as the operating principle of RAM as well as some other points essential to understanding the RAM [...]

BufferOverflowProgramMemoryBinaryCrash
What is a Buffer Overflow and How Hackers Exploit these Flaws Part 1
What is a Buffer Overflow and How Hackers Exploit these Flaws Part 1

This article is the first in a series dedicated to binary exploitation which is also more commonly known as "pwn". A buffer overflow, or buffer overrun, is an [...]

BufferOverflowProgramMemoryBinaryCrash
Getting Started with Sqlmap for Pentest and Ethical Hacking
Getting Started with Sqlmap for Pentest and Ethical Hacking

Using SQLmap can be tricky when you are not familiar with it. This SQLmap tutorial aims to present the most important functionalities of this popular SQL [...]

DumpHashInjectionSQLISqlmapPython
How Hackers Exploit BlueKeep Vulnerability on Windows Servers
How Hackers Exploit BlueKeep Vulnerability on Windows Servers

BlueKeep is a security vulnerability that was discovered in Microsoft's Remote Desktop Protocol implementation of Windows 2008 R2 and Windows 7

MoneroBlueKeepMetasploitReverseDumpWindows
How Hackers Exploit Struts2 on Linux and Windows Servers
How Hackers Exploit Struts2 on Linux and Windows Servers

The Jakarta Multipart Parser in Apache Struts 2 has incorrect exception handling and error-message generation during file-upload attempts.

ApacheJexbossLinuxMetasploitStruts2Windows
SQL Injection Tutorial from Beginner to Advanced
SQL Injection Tutorial from Beginner to Advanced

SQL Injection (SQLi) refers to an injection attack wherein an attacker can execute malicious SQL statements that control a web application's database server.

BlindInjectionMySQLSelectSQLITablesUnion
How to Create a Reverse Shell to Remotely Execute Commands
How to Create a Reverse Shell to Remotely Execute Commands

If you're lucky enough to find a command execution vulnerability during a penetration test, pretty soon afterwards you'll probably want to establish an [...]

BashNetcatPerlPHPPythonReverseRubyShellTelnet
Evading AntiVirus with Encrypted Payloads using Venom
Evading AntiVirus with Encrypted Payloads using Venom

Be able to bypass Antivirus can be very useful while penetration testing phases. Venom allow you to generate shellcode that work with encrypted payloads.

AntivirusDLLMetasploitMSIPayloadsPythonRubyVenom