WebDAV is an extension to the HTTP protocol that allows users to upload, move or change the documents on the server via HTTP verbs. In this post learn how to exploit WebDAV using Metasploit
Hey there everyone, I am Gurkirat Singh (aka tbhaxor). I do full-stack development to fund my own learning and experiments. I am a cybersecurity enthusiast and like sharing my knowledge.
An unmanaged code is one that is written outside the DotNet framework which is allowed to be executed at runtime. In this, you will learn how to use C# and DotNet to execute a shellcode crafted from Metasploit.
Connect back shell allows attackers to bypass the firewall by making the client connect to the malicious server. Learn how to implement such a server in CSharp language to perform C&C
In the infosec, password cracking is considered as the easiest part given that the encrypted password exists in the wordlist and you are patient enough to wait. Learn basics of the hashcat password cracking tool and how to prevent from being the target of password attack
Get a detailed walkthrough on the Linux privileged escalation CTF brought to you by the attackdefence platform.