DEV Community

# pentest

Posts

ūüĎč Sign in for the ability to sort posts by relevant, latest, or top.
Hack The Box - Vessel [Hard] - Walkthrough

Hack The Box - Vessel [Hard] - Walkthrough

2
Comments
4 min read
Pentesting Tools I Use Everyday

Pentesting Tools I Use Everyday

Comments
6 min read
Using Node.js to Parse a JSON File Generated from WPScan

Using Node.js to Parse a JSON File Generated from WPScan

Comments
3 min read
'; SQL_Injection ( ) ;--

'; SQL_Injection ( ) ;--

4
Comments 2
7 min read
Why Rust for offensive security

Why Rust for offensive security

4
Comments
2 min read
Find your way in GraphQL applications - Paths explained

Find your way in GraphQL applications - Paths explained

13
Comments 4
1 min read
GraphDNA: Fingerprint GraphQL engines

GraphDNA: Fingerprint GraphQL engines

9
Comments
1 min read
A new tool for recon Office365 users

A new tool for recon Office365 users

6
Comments
1 min read
Como eu descobri uma falha de segurança em um sistema na minha universidade

Como eu descobri uma falha de segurança em um sistema na minha universidade

6
Comments
6 min read
How did I discover a security vulnerability in a system of my university

How did I discover a security vulnerability in a system of my university

3
Comments
6 min read
Abusing Managed Identities

Abusing Managed Identities

9
Comments
4 min read
Soft Deleted Blobs

Soft Deleted Blobs

4
Comments
3 min read
Extracting credentials from App Service

Extracting credentials from App Service

5
Comments
1 min read
Exfiltering VM disks using PowerZure

Exfiltering VM disks using PowerZure

3
Comments
2 min read
Anonymous Blob Access

Anonymous Blob Access

9
Comments
2 min read
Extracting stored passwords and certificates from Automation accounts

Extracting stored passwords and certificates from Automation accounts

5
Comments
2 min read
Enumerating subscription information with MicroBurst

Enumerating subscription information with MicroBurst

6
Comments
2 min read
Escalating Privileges using a misconfigured service principal

Escalating Privileges using a misconfigured service principal

5
Comments
3 min read
Gathering Subscription access information with PowerZure

Gathering Subscription access information with PowerZure

6
Comments
2 min read
Things To Keep In Mind About Software Development Penetration Testing

Things To Keep In Mind About Software Development Penetration Testing

2
Comments
4 min read
Rebind Socket Shellcode

Rebind Socket Shellcode

3
Comments 1
22 min read
Conceal - HackTheBox Writeup

Conceal - HackTheBox Writeup

7
Comments
8 min read
Learning pentesting path

Learning pentesting path

6
Comments
1 min read
What is ethical hacking and penetration testing? Get paid to hack

What is ethical hacking and penetration testing? Get paid to hack

44
Comments 1
8 min read
Buffer Overflow ASLR Bypass on HackTheBox October - with Metasploit

Buffer Overflow ASLR Bypass on HackTheBox October - with Metasploit

2
Comments
14 min read
Website Penetration Testing

Website Penetration Testing

66
Comments 3
1 min read
Information Gathering with "theHarvester"

Information Gathering with "theHarvester"

6
Comments
9 min read
Buffer Overflow on HackTheBox Frolic - with Metasploit

Buffer Overflow on HackTheBox Frolic - with Metasploit

15
Comments
14 min read
How to do a quick network recon during a pentest or CTF

How to do a quick network recon during a pentest or CTF

19
Comments
2 min read
Writeup: HackTheBox Bastard - NO Metasploit

Writeup: HackTheBox Bastard - NO Metasploit

7
Comments
9 min read
Writeup: HackTheBox Arctic - with Metasploit

Writeup: HackTheBox Arctic - with Metasploit

5
Comments
3 min read
Repl.it Open URL Redirection Vulnerability Writeup

Repl.it Open URL Redirection Vulnerability Writeup

2
Comments
3 min read
Substack Open URL Redirection / Reflected XSS Vulnerability Writeup

Substack Open URL Redirection / Reflected XSS Vulnerability Writeup

3
Comments
3 min read
How'd I Get Here? Exploiting Redirection

How'd I Get Here? Exploiting Redirection

3
Comments
4 min read
Week 3: Introduction to John the Ripper

Week 3: Introduction to John the Ripper

6
Comments
5 min read
Week 2: Knowing the penetration testing steps

Week 2: Knowing the penetration testing steps

17
Comments
4 min read
Week 1: Being conscious about your attack surface

Week 1: Being conscious about your attack surface

7
Comments
5 min read
Week 0: Security blog posts introduction

Week 0: Security blog posts introduction

16
Comments
2 min read
Writeup: HackTheBox Optimum - with Metasploit

Writeup: HackTheBox Optimum - with Metasploit

5
Comments
3 min read
Writeup: HackTheBox Devel - with Metasploit

Writeup: HackTheBox Devel - with Metasploit

4
Comments
4 min read
Writeup: HackTheBox Legacy - with Metasploit

Writeup: HackTheBox Legacy - with Metasploit

8
Comments
1 min read
Writeup: HackTheBox Lame - with Metasploit

Writeup: HackTheBox Lame - with Metasploit

10
Comments
5 min read
Writeup: SANS Holiday Hack Challenge 2019

Writeup: SANS Holiday Hack Challenge 2019

7
Comments
16 min read
Writeup: Derbycon 9: Bank of America CTF

Writeup: Derbycon 9: Bank of America CTF

12
Comments
34 min read
How to set up Metasploitable 3 on macOS Mojave

How to set up Metasploitable 3 on macOS Mojave

6
Comments 1
4 min read
10 Useful Tools to Exploit Your Security

10 Useful Tools to Exploit Your Security

51
Comments
3 min read
VAs, Scans and PenTests; not the same thing

VAs, Scans and PenTests; not the same thing

29
Comments 4
4 min read
How to fully leverage your pentest

How to fully leverage your pentest

9
Comments 1
11 min read
About penetration testing

About penetration testing

11
Comments 1
3 min read
Making easier a NoSQLi pentest

Making easier a NoSQLi pentest

5
Comments
2 min read
Using the Digispark as a cheap USB Rubber Ducky

Using the Digispark as a cheap USB Rubber Ducky

7
Comments
4 min read
Security Testing: Fighting against bots

Security Testing: Fighting against bots

8
Comments
3 min read
loading...