Cybertech MaveninInfoSec Write-upsCreating Payloads with ScareCrow to Mimic Reputable Sources and Bypass Anti-VirusThis write-up discusses using ScareCrow to create payload frameworks for side loading (not injecting) into a legitimate Windows process…Apr 131Apr 131
Cybertech MaveninThe Gray AreaConcealing a RAT Within a File to Compromise a Windows SystemThis write-up will discuss how a Windows machine can be hacked by embedding a Remote Access Trojan (RAT) inside a file. This will enable…Dec 11, 20233Dec 11, 20233
Cybertech MaveninSystem WeaknessUnveiling the Mechanics of Session Hijacking: A Step-by-Step Guide to Capture and Exploit CookiesNov 18, 2023Nov 18, 2023
Cybertech MaveninInfoSec Write-upsOn Path Attacks: File Transfer Capture with Ettercap and WiresharkWe can intercept SMB file transfers by assuming an on-path position between targets.Oct 20, 2023Oct 20, 2023
Cybertech MaveninThe Gray AreaCredential Stuffing Attack— How to Brute Force a Website that is CAPTCHA-ProtectedFor educational purposes, I will demonstrate how to conduct a credential stuffing attack on a demo website that reCAPTCHA protects.Sep 18, 2023Sep 18, 2023
Cybertech MaveninSystem WeaknessHow to Use Lynis for System Vulnerability ScanningIntroductionSep 8, 2023Sep 8, 2023
Cybertech MaveninInfoSec Write-upsIntroduction to OpenVAS — A Vulnerability ScannerKali Linux provides a tool named the Open Vulnerability Assessment System (OpenVAS) for vulnerability scanning of the system on a network…Aug 28, 2023Aug 28, 2023
Cybertech MaveninInfoSec Write-upsNikto Introduction — Web Application SecurityAug 23, 2023Aug 23, 2023
Cybertech MaveninSystem WeaknessHow to use Netsniff-ng and Wireshark in Kali Linux to Capture Login CredentialsIntroductionAug 18, 20232Aug 18, 20232