David Eduardo KarpinskiHacking WEP NetworksHey guys, in this article I will give a simple demonstration of how to hack networks based on WEP Protocol, which despite being obsolete…14h ago14h ago
David Eduardo KarpinskiPython Library HijackingHey guys, I hope everyone is doing well! Today’s topic is Python Library Hijacking, a privilege escalation technique that allows you to…Jul 24Jul 24
David Eduardo KarpinskiCredential Dump with MimikatzHello everyone, I hope you are all well! Today we will cover extracting hashes from memory on Windows systems using the Mimikatz tool.Jul 8Jul 8
David Eduardo KarpinskiActive Directory Pass-The-Hash: Practical Guide for ExploitationThe Pass-The-Hash attack is an advanced technique used to compromise Windows systems, allowing attackers to authenticate on remote systems…Jul 6Jul 6
David Eduardo KarpinskiHow to Install Redis SecurelyRedis is the fastest in-memory database in the world, used in applications for operations involving caching. Today I will demonstrate the…Jun 24Jun 24
David Eduardo KarpinskiRooting a High Level CTFHello everyone, I hope everyone is well! Today I will demonstrate what the invasion process was like on a CTF machine I made these days…Jun 18Jun 18