In case of multiple websites using a single IP, and we have been asked to perform vulnerability assessment to ensure its security, how many to target

When doing black-box vulnerability assessment (with permission of course) of a subdomain of a website, the first step is enumeration; and the first step of that is finding IP of the subdomain.
If you find this IP, and then upon performing … Continue reading In case of multiple websites using a single IP, and we have been asked to perform vulnerability assessment to ensure its security, how many to target

Is there a technique for lateral movement in a non Active Directory network? [closed]

During a pentest I used to move laterally between Active Directory workstations using psexec or remote service creation techniques.
But this is the first time that I have had to conduct a pentest of a small organisation with 20-25 computer… Continue reading Is there a technique for lateral movement in a non Active Directory network? [closed]

Can attacker gain access to my private network application through pivoting and/or lateral movement?

I am using a public wifi network.
When I start a nodejs express server at my local system at port 3000, I can access that website on another device (that is connected to the same public wifi network) by going to the http://(private ip addr… Continue reading Can attacker gain access to my private network application through pivoting and/or lateral movement?