Malek AlthubianyUID and GID in Executing a BinaryUID and GID in Executing a Binary | | — 1. Definitions | | — a. UID (User ID) | | | — Unique identifier for a user | | | — Determines file…2d ago2d ago
Malek AlthubianyWindows Prevleige Escaltion using A vulnerable ServiceIntroduction: Windows Privilege Escalation Using a Vulnerable ServiceJul 10Jul 10
Malek AlthubianyUnmasking Hidden Secrets: Enumerating Windows CredentialsUnmasking Hidden Secrets: A Penetration Testing EngagementJul 7Jul 7
Malek AlthubianyUsing Executable Files: Step-by-Step Guide to File Upload VulnerabilitiesExploiting File Upload VulnerabilitiesJun 21Jun 21
Malek AlthubianyExploring PHP Wrappers: Enhancing PHP CapabilitiesPHP, as a versatile scripting language, offers a variety of protocol wrappers that extend its functionalities, particularly in handling…Jun 20Jun 20
Malek AlthubianyCybersecurity Roles and ResponsibilityCybersecurity Career Opportunities: AttackJun 14Jun 14
Malek AlthubianyUnquoted Service PathsUnquoted service paths are a known security vulnerability in Windows operating systems that can lead to privilege escalation. This…Jun 13Jun 13
Malek AlthubianyEnumerating The installed Application using Power shellList All Installed Applications: We’ll check both 32-bit and 64-bit registry paths for installed applications.Jun 1Jun 1
Malek AlthubianyThTransfer Files Between Local And Remote Machines Via Remote Desktop Connection (RDP) — One…Using this command:May 2May 2