DEV Community 👩‍💻👨‍💻

# pentest

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Find your way in GraphQL applications - Paths explained

Find your way in GraphQL applications - Paths explained

Reactions 13 Comments 4
1 min read
Why Rust for offensive security

Why Rust for offensive security

Reactions 4 Comments
2 min read
GraphDNA: Fingerprint GraphQL engines

GraphDNA: Fingerprint GraphQL engines

Reactions 9 Comments
1 min read
Como eu descobri uma falha de segurança em um sistema na minha universidade

Como eu descobri uma falha de segurança em um sistema na minha universidade

Reactions 6 Comments
6 min read
A new tool for recon Office365 users

A new tool for recon Office365 users

Reactions 6 Comments
1 min read
Abusing Managed Identities

Abusing Managed Identities

Reactions 9 Comments
4 min read
Extracting credentials from App Service

Extracting credentials from App Service

Reactions 5 Comments
1 min read
Exfiltering VM disks using PowerZure

Exfiltering VM disks using PowerZure

Reactions 3 Comments
2 min read
Anonymous Blob Access

Anonymous Blob Access

Reactions 9 Comments
2 min read
Extracting stored passwords and certificates from Automation accounts

Extracting stored passwords and certificates from Automation accounts

Reactions 5 Comments
2 min read
Enumerating subscription information with MicroBurst

Enumerating subscription information with MicroBurst

Reactions 6 Comments
2 min read
Escalating Privileges using a misconfigured service principal

Escalating Privileges using a misconfigured service principal

Reactions 5 Comments
3 min read
Gathering Subscription access information with PowerZure

Gathering Subscription access information with PowerZure

Reactions 6 Comments
2 min read
Things To Keep In Mind About Software Development Penetration Testing

Things To Keep In Mind About Software Development Penetration Testing

Reactions 2 Comments
4 min read
Rebind Socket Shellcode

Rebind Socket Shellcode

Reactions 3 Comments 1
22 min read
Conceal - HackTheBox Writeup

Conceal - HackTheBox Writeup

Reactions 7 Comments
8 min read
Learning pentesting path

Learning pentesting path

Reactions 6 Comments
1 min read
What is ethical hacking and penetration testing? Get paid to hack

What is ethical hacking and penetration testing? Get paid to hack

Reactions 43 Comments 1
8 min read
Buffer Overflow ASLR Bypass on HackTheBox October - with Metasploit

Buffer Overflow ASLR Bypass on HackTheBox October - with Metasploit

Reactions 2 Comments
14 min read
Website Penetration Testing

Website Penetration Testing

Reactions 66 Comments 3
1 min read
Information Gathering with "theHarvester"

Information Gathering with "theHarvester"

Reactions 6 Comments
9 min read
Buffer Overflow on HackTheBox Frolic - with Metasploit

Buffer Overflow on HackTheBox Frolic - with Metasploit

Reactions 15 Comments
14 min read
How to do a quick network recon during a pentest or CTF

How to do a quick network recon during a pentest or CTF

Reactions 19 Comments
2 min read
Writeup: HackTheBox Bastard - NO Metasploit

Writeup: HackTheBox Bastard - NO Metasploit

Reactions 7 Comments
9 min read
Writeup: HackTheBox Arctic - with Metasploit

Writeup: HackTheBox Arctic - with Metasploit

Reactions 5 Comments
3 min read
Repl.it Open URL Redirection Vulnerability Writeup

Repl.it Open URL Redirection Vulnerability Writeup

Reactions 2 Comments
3 min read
Substack Open URL Redirection / Reflected XSS Vulnerability Writeup

Substack Open URL Redirection / Reflected XSS Vulnerability Writeup

Reactions 3 Comments
3 min read
How'd I Get Here? Exploiting Redirection

How'd I Get Here? Exploiting Redirection

Reactions 3 Comments
4 min read
Week 3: Introduction to John the Ripper

Week 3: Introduction to John the Ripper

Reactions 6 Comments
5 min read
Week 2: Knowing the penetration testing steps

Week 2: Knowing the penetration testing steps

Reactions 16 Comments
4 min read
Week 1: Being conscious about your attack surface

Week 1: Being conscious about your attack surface

Reactions 7 Comments
5 min read
Week 0: Security blog posts introduction

Week 0: Security blog posts introduction

Reactions 16 Comments
2 min read
Writeup: HackTheBox Optimum - with Metasploit

Writeup: HackTheBox Optimum - with Metasploit

Reactions 5 Comments
3 min read
Writeup: HackTheBox Devel - with Metasploit

Writeup: HackTheBox Devel - with Metasploit

Reactions 4 Comments
4 min read
Writeup: HackTheBox Legacy - with Metasploit

Writeup: HackTheBox Legacy - with Metasploit

Reactions 8 Comments
1 min read
Writeup: HackTheBox Lame - with Metasploit

Writeup: HackTheBox Lame - with Metasploit

Reactions 10 Comments
5 min read
Writeup: SANS Holiday Hack Challenge 2019

Writeup: SANS Holiday Hack Challenge 2019

Reactions 7 Comments
16 min read
Writeup: Derbycon 9: Bank of America CTF

Writeup: Derbycon 9: Bank of America CTF

Reactions 11 Comments
34 min read
How to set up Metasploitable 3 on macOS Mojave

How to set up Metasploitable 3 on macOS Mojave

Reactions 6 Comments 1
4 min read
10 Useful Tools to Exploit Your Security

10 Useful Tools to Exploit Your Security

Reactions 51 Comments
3 min read
VAs, Scans and PenTests; not the same thing

VAs, Scans and PenTests; not the same thing

Reactions 29 Comments 4
4 min read
How to fully leverage your pentest

How to fully leverage your pentest

Reactions 9 Comments 1
11 min read
About penetration testing

About penetration testing

Reactions 11 Comments 1
3 min read
Making easier a NoSQLi pentest

Making easier a NoSQLi pentest

Reactions 5 Comments
2 min read
Using the Digispark as a cheap USB Rubber Ducky

Using the Digispark as a cheap USB Rubber Ducky

Reactions 7 Comments
4 min read
Security Testing: Fighting against bots

Security Testing: Fighting against bots

Reactions 8 Comments
3 min read
loading...