DEV Community

# pentest

Posts

ūüĎč Sign in for the ability to sort posts by relevant, latest, or top.
Como eu descobri uma falha de segurança em um sistema na minha universidade

Como eu descobri uma falha de segurança em um sistema na minha universidade

Reactions 6 Comments
6 min read
A new tool for recon Office365 users

A new tool for recon Office365 users

Reactions 6 Comments
1 min read
Abusing Managed Identities

Abusing Managed Identities

Reactions 9 Comments
4 min read
Extracting credentials from App Service

Extracting credentials from App Service

Reactions 5 Comments
1 min read
Exfiltering VM disks using PowerZure

Exfiltering VM disks using PowerZure

Reactions 3 Comments
2 min read
Anonymous Blob Access

Anonymous Blob Access

Reactions 9 Comments
2 min read
Extracting stored passwords and certificates from Automation accounts

Extracting stored passwords and certificates from Automation accounts

Reactions 5 Comments
2 min read
Enumerating subscription information with MicroBurst

Enumerating subscription information with MicroBurst

Reactions 6 Comments
2 min read
Escalating Privileges using a misconfigured service principal

Escalating Privileges using a misconfigured service principal

Reactions 5 Comments
3 min read
Gathering Subscription access information with PowerZure

Gathering Subscription access information with PowerZure

Reactions 7 Comments
2 min read
Things To Keep In Mind About Software Development Penetration Testing

Things To Keep In Mind About Software Development Penetration Testing

Reactions 2 Comments
4 min read
Rebind Socket Shellcode

Rebind Socket Shellcode

Reactions 3 Comments 1
22 min read
Conceal - HackTheBox Writeup

Conceal - HackTheBox Writeup

Reactions 7 Comments
8 min read
Learning pentesting path

Learning pentesting path

Reactions 6 Comments
1 min read
What is ethical hacking and penetration testing? Get paid to hack

What is ethical hacking and penetration testing? Get paid to hack

Reactions 43 Comments 1
8 min read
Buffer Overflow ASLR Bypass on HackTheBox October - with Metasploit

Buffer Overflow ASLR Bypass on HackTheBox October - with Metasploit

Reactions 2 Comments
14 min read
Website Penetration Testing

Website Penetration Testing

Reactions 66 Comments 3
1 min read
Information Gathering with "theHarvester"

Information Gathering with "theHarvester"

Reactions 6 Comments
9 min read
Buffer Overflow on HackTheBox Frolic - with Metasploit

Buffer Overflow on HackTheBox Frolic - with Metasploit

Reactions 15 Comments
14 min read
How to do a quick network recon during a pentest or CTF

How to do a quick network recon during a pentest or CTF

Reactions 19 Comments
2 min read
Writeup: HackTheBox Bastard - NO Metasploit

Writeup: HackTheBox Bastard - NO Metasploit

Reactions 7 Comments
9 min read
Writeup: HackTheBox Arctic - with Metasploit

Writeup: HackTheBox Arctic - with Metasploit

Reactions 5 Comments
3 min read
Repl.it Open URL Redirection Vulnerability Writeup

Repl.it Open URL Redirection Vulnerability Writeup

Reactions 2 Comments
3 min read
Substack Open URL Redirection / Reflected XSS Vulnerability Writeup

Substack Open URL Redirection / Reflected XSS Vulnerability Writeup

Reactions 3 Comments
3 min read
How'd I Get Here? Exploiting Redirection

How'd I Get Here? Exploiting Redirection

Reactions 3 Comments
4 min read
Week 3: Introduction to John the Ripper

Week 3: Introduction to John the Ripper

Reactions 6 Comments
5 min read
Week 2: Knowing the penetration testing steps

Week 2: Knowing the penetration testing steps

Reactions 16 Comments
4 min read
Week 1: Being conscious about your attack surface

Week 1: Being conscious about your attack surface

Reactions 7 Comments
5 min read
Week 0: Security blog posts introduction

Week 0: Security blog posts introduction

Reactions 16 Comments
2 min read
Writeup: HackTheBox Optimum - with Metasploit

Writeup: HackTheBox Optimum - with Metasploit

Reactions 5 Comments
3 min read
Writeup: HackTheBox Devel - with Metasploit

Writeup: HackTheBox Devel - with Metasploit

Reactions 4 Comments
4 min read
Writeup: HackTheBox Legacy - with Metasploit

Writeup: HackTheBox Legacy - with Metasploit

Reactions 8 Comments
1 min read
Writeup: HackTheBox Lame - with Metasploit

Writeup: HackTheBox Lame - with Metasploit

Reactions 9 Comments
5 min read
Writeup: SANS Holiday Hack Challenge 2019

Writeup: SANS Holiday Hack Challenge 2019

Reactions 7 Comments
16 min read
Writeup: Derbycon 9: Bank of America CTF

Writeup: Derbycon 9: Bank of America CTF

Reactions 11 Comments
34 min read
How to set up Metasploitable 3 on macOS Mojave

How to set up Metasploitable 3 on macOS Mojave

Reactions 6 Comments 1
4 min read
10 Useful Tools to Exploit Your Security

10 Useful Tools to Exploit Your Security

Reactions 51 Comments
3 min read
VAs, Scans and PenTests; not the same thing

VAs, Scans and PenTests; not the same thing

Reactions 29 Comments 4
4 min read
How to fully leverage your pentest

How to fully leverage your pentest

Reactions 9 Comments 1
11 min read
About penetration testing

About penetration testing

Reactions 11 Comments 1
3 min read
Making easier a NoSQLi pentest

Making easier a NoSQLi pentest

Reactions 5 Comments
2 min read
Using the Digispark as a cheap USB Rubber Ducky

Using the Digispark as a cheap USB Rubber Ducky

Reactions 7 Comments
4 min read
Security Testing: Fighting against bots

Security Testing: Fighting against bots

Reactions 8 Comments
3 min read
loading...