With a few exceptions, the majority of books I have read about pen testing treat reporting as an after thought, with a few pages roughly
Walkthrough of Shocker (10.10.10.56) on Hack the box. nmap: nmap -v -p- -sC -sV -oA shocker 10.10.10.56 Lets quickly
In my previous post, we looked at how to exploit the shellshock vulnerability to gain a reverse shell from our vulnerable machine back to the
Given that my first pentesting experience resulted in a discovery of the shellshock vulnerability, I thought I would write an explanation detailing the vulnerability. What
In this post, I'm going to give you an overview of how I approached the process of doing a live penetration test for a client.