Penetration testing April 5, 2016 Infosec Snort Tracking Exploit Progress with Flowbits So far in our exercises, we used individual rules against specific activities. The flowbits keyword allows several rules to work as a group, tracking a progress...
Penetration testing March 31, 2016 Infosec Snort Covert Channels Covert channels are used by outside attackers to establish communications with the compromised system, or by malicious insiders to secretly transfer data to...
Penetration testing March 29, 2016 Infosec Snort network recon techniques In this lab, we will examine some popular network recon techniques and practice writing Snort rules for their detection. Nmap is by far one of...
Penetration testing March 18, 2016 Irfan Shakeel VoIP network recon: Footprinting, scanning, and enumeration The traditional PSTN has been replaced by more advanced and efficient VoIP network. VoIP has quickly made its place in the corporate and home environment as...
Penetration testing March 17, 2016 Security Ninja Complete Tour of PE and ELF: Directories In Part 1 and Part 2 of this series we have done a walkthrough of almost 70 percent of E structure. There are still some import sections remaining like exports,...
Penetration testing March 15, 2016 Security Ninja Complete Tour of PE and ELF: Data Structures We covered some important sections in Part 1 of this series. In this part, we will cover some more complex data structures including important concepts of...
Penetration testing March 14, 2016 Ahmed Mohamed Race condition (TOCTOU) vulnerability lab [download]CLICK HERE TO DOWNLOAD THIS LAB AS A PDF[/download] A race condition occurs when two threads access a shared variable at the same time. The first...
Penetration testing January 18, 2016 aurelius Creating your Own Simple Exploit Module for a Remote Code Execution in Web Apps To all readers, a zip file containing the code used in the article can also be downloaded here: [download] MSF is one of the most popular penetration testing...
Penetration testing January 5, 2016 Srinivas A Beginner’s Guide to Setting Up an SNMP Pentest Lab Using Vyos and Pfsense SNMP often provides a great deal of information during the information gathering phase of a penetration test. It is often seen that SNMP protocol is commonly...
Penetration testing November 18, 2015 Srinivas Nishang: A Post-Exploitation Framework I was recently doing an external penetration test for one of our clients, where I got shell access to Windows Server 2012(Internal WebServer sitting behind...