Where can I post my write-ups? [closed]
Is there a place where I can post my write-ups with a probability to be noticed?
What’s the best path to get people to notice you? (besides LinkedIn)
Collaborate Disseminate
Is there a place where I can post my write-ups with a probability to be noticed?
What’s the best path to get people to notice you? (besides LinkedIn)
This maybe a lame question but I am facing serious trouble with this. I am practicing penetration testing on some lab boxes. I got the partial reverse shell. In order to make this fully interactive shell, I need to background that current … Continue reading Unable to click Enter after foreground a process [migrated]
I am using Burp Intruder to upload a webshell to different directories.
These 400 responses tell me the requests are bad. I should be getting mostly 403 responses or maybe if I’m lucky the goal would be to get 1 200 response.
What is wr… Continue reading Uploading php webshell using Burp Intruder
I have a website made in wp and i want to hack it.
I have got to know that it uses 7 plugins(and from internet i got to know that most of the websites of wp are hacked using plugin vulnebilities)
, one of them is contact-form-7 (its not up… Continue reading penetration testing For My WP site [closed]
Which Is Better? A Vulnerability Scan Or A Penetration Test?
Vulnerability scanning and penetration tests are two very different ways to test your system for any vulnerabilities. Despite this, they are often confused about the same service,… Continue reading Which is more Important: Vulnerability Scans Or Penetration Tests?
I would like to learn and practice some basic attacks using Kali Linux VM. I don’t have my WIFI adapter yet(Monitor mode and injection capable).
Need suggestions on some basic attacks which will not require any external adaptors.
Note : I … Continue reading Need suggestions on learning basic attacks in Kali-Linux without using external adapters [closed]
ParrotOS has more tools compare to Kali Linux but why Kali Linux mostly use for penetration testing ?
Continue reading why Kali Linux mostly use for penetration testing? [closed]
Guys I go to the null byte website and log in and I can’t ask a question there, this appears when I try to make a post:
Sorry, you don’t have permission to submit.
Can anyone tell me how do I solve this? I want to ask a question there an… Continue reading How to ask question in the null byte forum [closed]
There are hundreds of articles if we search "how to exploit AD Environment?" but if you read them, you will find that every article focuses on the context of the domain user Account.
Now I am here to ask what can be the attack wa… Continue reading Ways to exploit AD in context of Domain Computer account not as Domain user account?
I’m testing a web app (for which I have permissions) and I found a stored XSS vulnerability.
It is a little bit tricky to exploit because the input:
is being capitalized
it has a length constraint of 61 characters (every char over the 61t… Continue reading Stored XSS Cookie Stealing – shortest payload