David Eduardo KarpinskiinSystem WeaknessPython Library HijackingHey guys, I hope everyone is doing well! Today’s topic is Python Library Hijacking, a privilege escalation technique that allows you to…Jul 24Jul 24
David Eduardo KarpinskiinSystem WeaknessCredential Dump with MimikatzHello everyone, I hope you are all well! Today we will cover extracting hashes from memory on Windows systems using the Mimikatz tool.Jul 8Jul 8
David Eduardo KarpinskiinSystem WeaknessActive Directory Pass-The-Hash: Practical Guide for ExploitationThe Pass-The-Hash attack is an advanced technique used to compromise Windows systems, allowing attackers to authenticate on remote systems…Jul 6Jul 6
David Eduardo KarpinskiinSystem WeaknessHow to Install Redis SecurelyRedis is the fastest in-memory database in the world, used in applications for operations involving caching. Today I will demonstrate the…Jun 24Jun 24
David Eduardo KarpinskiinSystem WeaknessRooting a High Level CTFHello everyone, I hope everyone is well! Today I will demonstrate what the invasion process was like on a CTF machine I made these days…Jun 18Jun 18
David Eduardo KarpinskiinSystem WeaknessLinux Post Exploitation TechniquesHello everyone, how long has it been! I hope everyone is okay! In the last few days I’ve been missing, it was college exam week (and what…Jun 11Jun 11
David Eduardo KarpinskiinSystem WeaknessReverse Shell with Arduino Bad USBAfter my article on Reverse Shell with Rubber Ducky, it’s time to do the same procedure, but with Arduino, the electronics prototyping…May 29May 29