Blog
The Journey of how I passed CISSPHow Nmap gets what OS is running by using different probesHow PsExec or similar tools operate over SMB to achieve remote command executionBeyond Session Hijacking: Using JavaScript Libraries for Comprehensive User Profiling Through XSSWhy does encoded message have a = or ==What Does "/bin/bash -p" Do?Extract username from private SSH keyPurpose of Service Principal Names (SPN) in Active DirectoryGet Passwords from Teamviewer windows (No Metasploit)Difference between actively logged on users, locally logged on users and remotely logged usersPacket Flow in RouterOSDepixelating information in the document (finding what was not supposed to be found)Spotting Spoofing Securing Your Email with DMARC, DKIM, and SPFStop Telling People to “Just Look at the URL”: You're Not That Special🧠 NFS Isn’t Just File Sharing — It’s RPC in Disguise😤 I Had Write Permissions... So Why Was Linux Saying "No"?🧠 Post-Root Enlightenment: Why You Really Pwn Boxes — Thanks to IppSecFrom Chaos to Compliance A Smart Audit Logging Strategy for MariaDB
Last updated