Category: Uncategorized
-
Sacramento Pentest
From Capital City to Cybersecurity Hub: Sacramento’s Digital Transformation Sacramento, California’s capital city, has been steadily evolving into a significant tech center with a growing focus on cybersecurity. Known for its rich history and government presence, Sacramento is now emerging as a dynamic tech ecosystem, showcasing its adaptability and innovative spirit. The sacramento pentest initiative…
-
Boston Penetration Testing
As cyber threats continue to evolve and become more sophisticated, the city of Boston has recognized the need to enhance its cybersecurity measures. In response, Boston has launched the Boston Penetration Testing Initiative, a comprehensive program aimed at improving the cybersecurity posture of businesses and government entities across the city through rigorous penetration testing (pentesting)…
-
SSRF Cheatsheet: Comprehensive Guide
Server-Side Request Forgery (SSRF) is a critical web application vulnerability that allows attackers to manipulate server-side requests. This SSRF cheatsheet provides an extensive collection of techniques to bypass security filters and exploit SSRF vulnerabilities. Whether you’re a penetration tester, security researcher, or developer, this guide will enhance your understanding of SSRF attacks and defenses. (Be…
-
Nmap Cheatsheet: Mastering Network Scanning
The nmap cheatsheet is an indispensable resource for network administrators, security professionals, and ethical hackers. This comprehensive guide will walk you through the various features and techniques of nmap, empowering you to conduct thorough network reconnaissance and vulnerability assessments. 1.2 Why Use Nmap? Nmap is versatile, powerful, and constantly updated, making it essential for network…
-
RegreSSHion Ip Scanner Tool
This is my RegreSSHion ip scanner written in GO. It can find single ip’s, cidr’s, ip’s from a file, and checks for different ports. This will be more effective than any Python written scanner simply because you can do concurrent scans against very long lists of ip’s, and hence, it’s much Quicker. I’ve already seen…
-
RegreSSHion Exploit
After you’ve checked for RegreSSHion bug check on your servers openSSH protocol, (there is a list of vulnerable devices out there btw, over 2.5 million), be sure to check out this code exploit. (RegreSSHion Ip Scanner tool here ) Will this become the cve-2024-6387 exploit ? (Try it locally only!) RegreSSHion exploit code written in…
-
RegreSSHion OpenSSH Bug Check
The Recent OpenSSH Vulnerability (CVE-2023-38408): Update : July 3, 24 12:46 pm – Exploit code link here. RegreSSHion Ip Scanner tool here. This vulnerability, discovered in July 2023, affects OpenSSH versions 9.3 and 9.3p1. It’s specifically related to the implementation of RSA keys with SHA-2 signature algorithms. Read on for more on the RegreSSHion OpenSSH…
-
Chicago Penetration Testing
From Windy City to Cyber Sentinel: Chicago’s Digital Security Renaissance Chicago, Illinois, known as the “Windy City,” has been quietly transforming into a burgeoning tech hub with a growing focus on cybersecurity. The city’s journey from an industrial and financial powerhouse to a dynamic tech ecosystem is a testament to its adaptability and innovative spirit.…
-
Golang Penetration Testing
Internal network penetration testing is a crucial aspect of cybersecurity that helps organizations identify vulnerabilities within their internal network infrastructure. By simulating real-world attack scenarios, security professionals can uncover weaknesses and recommend appropriate mitigation strategies. Go (Golang) is an excellent language for network penetration testing due to its strong networking capabilities, concurrent programming model, and…
-
Goroutines GoMaxprocs
Goroutines are a fundamental feature of Go (Golang) that enable concurrent execution. They are lightweight threads managed by the Go runtime, allowing developers to write concurrent programs with ease. Goroutines are more efficient than traditional operating system threads because they have a smaller memory footprint and can be created and destroyed more quickly. Key Concepts…