Penetration testing

Learning Pentesting with Metasploitable3: (Exploiting WebDAV)

Introduction: In the third part of this series, we discussed how to exploit Metasploitable3 using a vulnerability in Elasticsearch 1.1.1. As mentioned in one

Learning Pentesting with Metasploitable3: Exploiting Elasticsearch

Introduction: In the second part of this series, we discussed how we could gather information about our target to proceed with the exploitation phase. Let's

Web application pentest guide Part-II

In last part of the article we have discussed the process of Requirement Collection, Information gathering and URL discovery now we will discuss the other st

Web Application Pentest Guide Part-I

In this article, we are going to pentest a web application which was developed by HP for scanner evaluation purpose. We will be demonstrating the complete pr

NAC-hacking - Bypassing network access control

Conducting internal network penetration tests is always fun. There are vulnerabilities that easily help me to get to "keys of the kingdom" i.e. domain admin.

Learning Pentesting with Metasploitable3 – Part 2

Introduction: This is the second part in this series of articles on Learning Pentesting with Metasploitable3. We have prepared our lab setup in our previous

Learning Pentesting with Metasploitable3

Metasploitable is back with version 3, which includes lot more interesting vulnerabilities. Metasploitable3 is special because it is not a pre-configured dow

Kioptrix: Level 1 - Walkthrough

Kioptrix: Level 1 surfaced on VulnHub on February 17th, 2010. Created by Kioptrix, it can be found at https://www.vulnhub.com/entry/kioptrix-level-1-1,22/. I

Billu: B0x - Walkthrough

Billu B0x is a relatively new machine that came on VulnHub. Created by Manish Kishan Tanwar, it surfaced on April 21st, 2017. It can be downloaded from https

Misconfigured WAFs: Bypassing Broken Access Controls Protection

In this article, I will look to build upon the previous article I wrote on finding zero-day vulnerabilities in Oracle e-business suite. The link can be found