A Beginners guide to Pen Test Reporting Mar 1, 2019 pentesting reporting guide A Beginners guide to Pen Test Reporting With a few exceptions, the majority of books I have read about pen testing treat reporting as an after thought, with a few pages roughly
Hack the Box - Shocker Walkthrough Jan 17, 2018 pentesting htb walkthrough Hack the Box - Shocker Walkthrough Walkthrough of Shocker (10.10.10.56) on Hack the box. nmap: nmap -v -p- -sC -sV -oA shocker 10.10.10.56 Lets quickly
Shellshock Vulnerability - Privilege escalation Nov 20, 2017 pentesting exploits enumeration techniques Shellshock Vulnerability - Privilege escalation In my previous post, we looked at how to exploit the shellshock vulnerability to gain a reverse shell from our vulnerable machine back to the
Shellshock Vulnerability Sep 28, 2017 pentesting vulnerabilities exploits Shellshock Vulnerability Given that my first pentesting experience resulted in a discovery of the shellshock vulnerability, I thought I would write an explanation detailing the vulnerability. What
Pentesting Experience Jul 13, 2017 information security oscp pentesting Pentesting Experience In this post, I'm going to give you an overview of how I approached the process of doing a live penetration test for a client.