Menu

Exploitation

Exploitation is the next step in a hacker's playbook after finding a vulnerability, mostly used to gaining unauthorized access or information
How Hackers Exploit BlueKeep Vulnerability on Windows Servers
How Hackers Exploit BlueKeep Vulnerability on Windows Servers

BlueKeep is a security vulnerability that was discovered in Microsoft's Remote Desktop Protocol implementation of Windows 2008 R2 and Windows 7

MoneroBlueKeepMetasploitReverseDumpWindows
How Hackers Exploit Struts2 on Linux and Windows Servers
How Hackers Exploit Struts2 on Linux and Windows Servers

The Jakarta Multipart Parser in Apache Struts 2 has incorrect exception handling and error-message generation during file-upload attempts.

ApacheJexbossLinuxMetasploitStruts2Windows
SQL Injection Tutorial from Beginner to Advanced
SQL Injection Tutorial from Beginner to Advanced

SQL Injection (SQLi) refers to an injection attack wherein an attacker can execute malicious SQL statements that control a web application's database server.

BlindInjectionMySQLSelectSQLITablesUnion
How to Create a Reverse Shell to Remotely Execute Commands
How to Create a Reverse Shell to Remotely Execute Commands

If you're lucky enough to find a command execution vulnerability during a penetration test, pretty soon afterwards you'll probably want to establish an interactive [...]

BashNetcatPerlPHPPythonReverseRubyShellTelnet
Evading AntiVirus with Encrypted Payloads using Venom
Evading AntiVirus with Encrypted Payloads using Venom

Be able to bypass Antivirus can be very useful while penetration testing phases. Venom allow you to generate shellcode that work with encrypted payloads.

AntivirusDLLMetasploitMSIPayloadsPythonRubyVenom