Author: admin

  • Cobalt Strike Shellcode Payloads – Network Penetration Testing

    shellcode development in network penetration testing

  • Network Penetration Testing & Cobalt Strike

    Network penetration testing plays a crucial role in assessing the security of an organization’s digital infrastructure. In this comprehensive guide, we will explore the advanced capabilities of Cobalt Strike, a versatile tool often referred to as a “Swiss Army knife” for penetration testers. By understanding how Cobalt Strike works and incorporating practical examples, we aim…

  • Mitnick Security – A legend

    The name Kevin Mitnick conjures images of a prodigious hacker, a maestro of digital deception, whose exploits reverberated through the annals of cybersecurity in the 90’s – mitnick security. I recall downloading his books on limewire and other filesharing sites when I was only 14 years old. This was the time of 2600 mag, torrents,…

  • Wireshark Unveiled – Network pentest Tool

    Wireshark, a ubiquitous network protocol analyzer, has emerged as a cornerstone tool for network administrators, security professionals, and enthusiasts alike as 1 of the best internal network pentest tools. In this comprehensive article, we will delve into the intricacies of Wireshark, exploring its architecture, operational principles, historical debut, and the profound usefulness it offers, particularly…

  • Mastering Metasploit for Internal Network Pentests: A Comprehensive Guide

    Metasploit, a dynamic open-source penetration testing framework, stands tall as an epitome of versatility and efficacy in the cybersecurity realm for internal network pentests. Metasploit really excels once you’ve found a vulnerability in terms of TIME TO EXPLOITATION. My 1st encounter with metasploit was with Backtrack 5 r3. I could remember my excitement using it…

  • Nmap: Unveiling the Power of Internal Network Pentesting Tools

    In the dynamic landscape of the cybers, certain tools have not only withstood the test of time but have also become synonymous with the craft of internal network pentesting. Nmap, short for “Network Mapper,” stands tall as one of the most revered internal network pentesting tools. In this comprehensive guide, we will embark on a…

  • Burp Suite: Internal Network PenTest

    The significance of robust internal network penetration testing cannot be overstated, and burpsuite is one of the best internal network pentest tools.. One of the first times I began using burpsuite was when I was doing bugbounty’s on the Uber hackerone program, primarily looking for IDOR and open redirect vulnerabilities. Several of these were accepted.…

  • Go and Python: the Strengths and Trade-offs

    In the dynamic landscape of programming languages, developers are often faced with the dilemma of choosing the right tool for the job, so this is my analysis of go and python. Go (also known as Golang) and Python are two popular languages that cater to different needs and preferences within the programming community. In this…

  • Elegance of Goroutines in Go Programming

    In the expansive landscape of concurrent programming, Go, with its revolutionary feature known as goroutines, stands out as a beacon of efficiency and elegance. Goroutines, distinct from traditional operating system (OS) threads, usher in a paradigm shift in the way concurrent tasks are executed in Go programs. This comprehensive exploration aims to dissect the intricacies…

  • Subway Breach – Lockbit Ransomware Strikes Again

    Subway, the globally recognized and ubiquitous sandwich fast food franchise, now finds itself ensnared in the ominous web of Lockbit, a ransomware group of global notoriety that has etched its name into the annals of cyber history with this subway breach. Before we delve further into Subway’s breach, I want to preface this article by…