Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

DEV Community

# pentest

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How To Find Zombie Hosts With Nmap?

How To Find Zombie Hosts With Nmap?

Comments
2 min read
You do not know, what you do not know.

You do not know, what you do not know.

Comments
2 min read
What is a polyglot in Hacking

What is a polyglot in Hacking

Comments
2 min read
10 Livros para Aprendizado Avançado de Pentest e Segurança (Hackers)

10 Livros para Aprendizado Avançado de Pentest e Segurança (Hackers)

1
Comments
12 min read
Explorando o Metasploit Framework: A Ferramenta Essencial para Testes de Penetração e Segurança

Explorando o Metasploit Framework: A Ferramenta Essencial para Testes de Penetração e Segurança

Comments
3 min read
Setting Up Your Flipper Zero: A Step-by-Step Guide for Beginners

Setting Up Your Flipper Zero: A Step-by-Step Guide for Beginners

4
Comments
4 min read
How I transformed my career from software engineer to a penetration tester?

How I transformed my career from software engineer to a penetration tester?

Comments
2 min read
Otimizando Wordlists para Pentests

Otimizando Wordlists para Pentests

3
Comments
7 min read
O que vem depois do Pentesting?

O que vem depois do Pentesting?

14
Comments
13 min read
Cloud Pentest 101

Cloud Pentest 101

35
Comments
2 min read
Information Gathering

Information Gathering

5
Comments
2 min read
Pentesting Tools I Use Everyday

Pentesting Tools I Use Everyday

1
Comments
6 min read
Using Node.js to Parse a JSON File Generated from WPScan

Using Node.js to Parse a JSON File Generated from WPScan

1
Comments 1
3 min read
'; SQL_Injection ( ) ;--

'; SQL_Injection ( ) ;--

6
Comments 2
7 min read
Find your way in GraphQL applications - Paths explained

Find your way in GraphQL applications - Paths explained

13
Comments 4
1 min read
GraphDNA: Fingerprint GraphQL engines

GraphDNA: Fingerprint GraphQL engines

9
Comments
1 min read
A new tool for recon Office365 users

A new tool for recon Office365 users

4
Comments
1 min read
Como eu descobri uma falha de segurança em um sistema na minha universidade

Como eu descobri uma falha de segurança em um sistema na minha universidade

6
Comments
6 min read
How did I discover a security vulnerability in a system of my university

How did I discover a security vulnerability in a system of my university

3
Comments
6 min read
Abusing Managed Identities

Abusing Managed Identities

9
Comments
4 min read
Soft Deleted Blobs

Soft Deleted Blobs

4
Comments
3 min read
Extracting credentials from App Service

Extracting credentials from App Service

5
Comments
1 min read
Exfiltering VM disks using PowerZure

Exfiltering VM disks using PowerZure

3
Comments
2 min read
Anonymous Blob Access

Anonymous Blob Access

9
Comments
2 min read
Extracting stored passwords and certificates from Automation accounts

Extracting stored passwords and certificates from Automation accounts

5
Comments
2 min read
Escalating Privileges using a misconfigured service principal

Escalating Privileges using a misconfigured service principal

5
Comments
3 min read
Enumerating subscription information with MicroBurst

Enumerating subscription information with MicroBurst

11
Comments
2 min read
Gathering Subscription access information with PowerZure

Gathering Subscription access information with PowerZure

5
Comments
2 min read
Things To Keep In Mind About Software Development Penetration Testing

Things To Keep In Mind About Software Development Penetration Testing

3
Comments 1
4 min read
Rebind Socket Shellcode

Rebind Socket Shellcode

3
Comments 1
22 min read
Conceal - HackTheBox Writeup

Conceal - HackTheBox Writeup

7
Comments
8 min read
Learning pentesting path

Learning pentesting path

6
Comments
1 min read
What is ethical hacking and penetration testing? Get paid to hack

What is ethical hacking and penetration testing? Get paid to hack

45
Comments 2
8 min read
Buffer Overflow ASLR Bypass on HackTheBox October - with Metasploit

Buffer Overflow ASLR Bypass on HackTheBox October - with Metasploit

3
Comments
14 min read
Website Penetration Testing

Website Penetration Testing

68
Comments 4
1 min read
Information Gathering with "theHarvester"

Information Gathering with "theHarvester"

9
Comments
9 min read
Buffer Overflow on HackTheBox Frolic - with Metasploit

Buffer Overflow on HackTheBox Frolic - with Metasploit

15
Comments
14 min read
How to do a quick network recon during a pentest or CTF

How to do a quick network recon during a pentest or CTF

19
Comments
2 min read
Writeup: HackTheBox Bastard - NO Metasploit

Writeup: HackTheBox Bastard - NO Metasploit

7
Comments
9 min read
Writeup: HackTheBox Arctic - with Metasploit

Writeup: HackTheBox Arctic - with Metasploit

5
Comments
3 min read
Repl.it Open URL Redirection Vulnerability Writeup

Repl.it Open URL Redirection Vulnerability Writeup

2
Comments
3 min read
Substack Open URL Redirection / Reflected XSS Vulnerability Writeup

Substack Open URL Redirection / Reflected XSS Vulnerability Writeup

3
Comments
3 min read
How'd I Get Here? Exploiting Redirection

How'd I Get Here? Exploiting Redirection

3
Comments
4 min read
Week 3: Introduction to John the Ripper

Week 3: Introduction to John the Ripper

6
Comments
5 min read
Week 2: Knowing the penetration testing steps

Week 2: Knowing the penetration testing steps

18
Comments 1
4 min read
Week 1: Being conscious about your attack surface

Week 1: Being conscious about your attack surface

7
Comments
5 min read
Week 0: Security blog posts introduction

Week 0: Security blog posts introduction

16
Comments
2 min read
Writeup: HackTheBox Optimum - with Metasploit

Writeup: HackTheBox Optimum - with Metasploit

5
Comments
3 min read
Writeup: HackTheBox Devel - with Metasploit

Writeup: HackTheBox Devel - with Metasploit

4
Comments
4 min read
Writeup: HackTheBox Legacy - with Metasploit

Writeup: HackTheBox Legacy - with Metasploit

8
Comments
1 min read
Writeup: HackTheBox Lame - with Metasploit

Writeup: HackTheBox Lame - with Metasploit

10
Comments
5 min read
Writeup: SANS Holiday Hack Challenge 2019

Writeup: SANS Holiday Hack Challenge 2019

7
Comments 2
16 min read
Writeup: Derbycon 9: Bank of America CTF

Writeup: Derbycon 9: Bank of America CTF

12
Comments
34 min read
How to set up Metasploitable 3 on macOS Mojave

How to set up Metasploitable 3 on macOS Mojave

8
Comments 1
4 min read
10 Useful Tools to Exploit Your Security

10 Useful Tools to Exploit Your Security

52
Comments
3 min read
Making easier a NoSQLi pentest

Making easier a NoSQLi pentest

5
Comments
2 min read
VAs, Scans and PenTests; not the same thing

VAs, Scans and PenTests; not the same thing

29
Comments 4
4 min read
How to fully leverage your pentest

How to fully leverage your pentest

9
Comments 1
11 min read
Using the Digispark as a cheap USB Rubber Ducky

Using the Digispark as a cheap USB Rubber Ducky

7
Comments
4 min read
About penetration testing

About penetration testing

11
Comments 1
3 min read
loading...