Penetration testing

PowerShell for Pentesters, Part 5: Remoting With PowerShell

Introduction In part five of our series on PowerShell for pentesters, we will discuss a very important subject: the process of remoting with PowerShell. Remo

Hack the Box (HTB) machines walkthrough series — Active

Continuing with our series on Hack The Box (HTB) machines, this article contains the walkthrough of an HTB machine named Active. HTB is an excellent platf

Hack the Box(HTB) machines walkthrough series — Tenten

Continuing with our series on Hack The Box (HTB) machines, this article contains the walkthrough of an HTB machine named Tenten. [pkadzone zone="main_top"

Hack the Box (HTB) machines walkthrough series — SolidState

Continuing with our series on Hack The Box (HTB) machines, this article contains the walkthrough of an HTB machine named SolidState. [pkadzone zone="main_

Raven 1: CTF walkthrough

­In this article, we will attempt to solve a Capture the Flag (CTF) challenge which was posted on VulnHub by William McCann. According to the information

Hack the Box (HTB) machines walkthrough series — Mirai

We are continuing with our series on HTB machines. This article contains the walkthrough of an HTB machine called Mirai. [pkadzone zone="main_top"] HTB

FourAndSix 2.1: CTF Walkthrough

In this article, we will solve a Capture the Flag (CTF) challenge that was posted on VulnHub by the author Fred. As you may be aware from my previous article

Bob 1.0.1: CTF walkthrough

In this article, we will learn to solve a Capture the Flag (CTF) challenge which was posted on VulnHub by “c0rruptedb1t.” According to the information given

Mimikatz: Walkthrough [updated 2019]

Security researchers have been obsessed with Windows security since the beginning of time. Various tools have been released over the years which try to weake

Quick and dirty BurpSuite tutorial

In this article we look at BurpSuite, a framework of tools that can be used during penetration testing. We’ll cover the latest release of BurpSuite, version