I've no idea - it doesn't ring any bells with me, which implies it might not be the path you need.
Think more about S*** and there are some good articles which can help you build the payload you need for this, or even all the t…
You dont. There are lots of other options.
The commands you issue in the shell are issued from inside that shell, yes.
You can. That is certainly one option. If you find a vulnerable service and can run the e…
Look how a HTTP request works.
Webservers can host many, many domain names on a single server/ip and they rely on the "host" header of the HTTP request to determine what content to return.
This might help: https…
Not sure what S**l is in this context. The first exploit I used wasn't blind. You could see the response in the next page - it's just that sometimes the browser hides that type of data from the rendering engine.
Well, if you are going to use a leaked course, the chances are high that if ELearnSecurity discovers, they'll reject your certification.
I won't ever suggest using materials that someone has leaked, not least because it becom…
A fantastic write up - again. Thanks for sharing.
You had a much more thorough approach - on the early steps I quickly gave up on trying to do it manually and used Sqlmap instead :smile:
Dont misunderstand me when I say I am pleased the AD bit too…
You may have resolved this now, if so this is commentary for people with the problem in the future:
What are the two hops in traceroute - this will probably say where the problem, if there is one, exists.
30 hops is…
A difficult question to answer - it is a very broad area of knowledge. I wouldn't know where to suggest you start.
It genuinely depends on what you already know. The resources tend to be split by OS and between disk and memor…
Everything that happens on a computer traverses the RAM. A lot of offensive tooling is developed by people who don't know what forensic traces it will leave.
Nothing is perfect (and forensics is an art as much as it is a scie…
OK - so forensics-wise, the main pain points are understanding modern windows Application Compatability Cache stores - they change, get compressed etc with each new windows build.
Or you could look at some way to automatically build linux memory pr…
OK - then the focus should be on something you find interesting which you also feel you have the skills to do.
I don't think learning something brand new from scratch would be a good move, so look back on the things you have done - what has really …
I dont know anything about blockchain (other than its the source of 95% of scams) and crypto is (IMHO) hard.
I wouldn't give up on the honeypot idea - have a look at this one in Docker https://github.com/ciscocsirt/dhp
From a professional point of…