Warlock

Warlock works as a Information Security Professional. He has quite a few global certifications to his name such as CEH, CHFI, OSCP and ISO 27001 Lead Implementer. He has experience in penetration testing, social engineering, password cracking and malware obfuscation. He is also involved with various organizations to help them in strengthening the security of their applications and infrastructure.
Warlock

Drunk Admin Web Hacking Challenge

This challenge includes a web application generally designed for image hosting. The application has a few vulnerabilities. The challenge is to exploit the ap

Vulnerability scanning with Metasploit part I

Metasploit Framework, the Metasploit Project's best-known creation, is a software platform for developing, testing, and executing exploits. It can be used to

File carving

File carving is a process used in computer forensics to extract data from a disk drive or other storage device without the assistance of the file system that

Exploiting X11 unauthenticated access

In this article, we are going to see how to exploit the x11Server Unauthenticated Access vulnerability which is associated with the CVE-1999-0526. How bad i

Trend Micro OSINT Challenge

In this article, we are going to solve all three OSINT challenges from Trend Micro CTF.[pkadzone zone="main_top"] Challenge 1: Today you received an email t

Web application pentest guide Part-II

In last part of the article we have discussed the process of Requirement Collection, Information gathering and URL discovery now we will discuss the other st

Web Application Pentest Guide Part-I

In this article, we are going to pentest a web application which was developed by HP for scanner evaluation purpose. We will be demonstrating the complete pr

Super Mario CTF Walkthrough

Super Mario is an intermediate level Boot2root CTF. We hosted the VM in the virtual box and ran Nmap scan on the target.[pkadzone zone="main_top"] We notic

Hackerfest Sedna CTF Walkthrough

Sedna is the second and medium level CTF from Hackerfest. We hosted the VM in Virtual box and ran nmap on its target IP. [pkadzone zone="main_top"] As can

Minotaur CTF Walkthrough

Minotaur is a boot2root CTF. Once you load the VM, treat it as a machine you can see on the network, i.e. you do not have physical access to this machine.

Hackerfest Quaoar CTF Walkthrough

Quaoar is the first and easiest CTF from Hackerfest. We hosted the VM in Virtual box and ran nmap on its target IP. [pkadzone zone="main_top"] As can be seen

Penetration Testing from Amazon Cloud

In this article, we are going to see how we will deploy a Windows and Linux system on an Amazon cloud server for penetration testing purposes. What is the di