
Penetration testing
Privilege escalation on linux with live examples
One of the most important phase during penetration testing or vulnerability assessment is privilege escalation. During that step, hackers and security resear

Hacking
From local file inclusion to code execution
Local File Inclusion (LFI) is one of the most popular attacks in Information Technology. In this article, we are not going to focus on what LFI attacks are o

Penetration testing
DNS enumeration techniques in Linux
During the Information Gathering phase, DNS enumeration is one of the most critical steps. When we mention DNS enumeration, we are referenced to all the tech

Hacking
Command and Shell Code Injection Scenarios with Commix and Shellter
Introduction This virtual, but yet realistic scenario was created to demonstrate some exploitation techniques by using my favorite tools. We will exploit a w