PinnedMaruf Farhan RiganinSystem WeaknessDumping Hashes with Mimikatz:Mimikatz is a well-liked post-exploitation tool that hackers use to steal crucial authentication credentials stored in memory, particularly…5 min read·Nov 12, 2023----
Maruf Farhan RiganCracking LiPrivilege Escalation: A Guide to Kernel ExploitationThe kernel is the core component of an operating system that manages system resources, facilitates communication between hardware and…4 min read·Apr 27, 2024----
Maruf Farhan RiganHarvesting Passwords from Usual Spots on Windows SystemWindows privilege escalation refers to techniques attackers use to gain more control over a computer system than their initial access…4 min read·Apr 23, 2024----
Maruf Farhan RiganHow To Enumerate Network Information in LinuxEnumerating network information on Linux is the process of manually gathering details about your system’s connection to the network. This…5 min read·Mar 26, 2024----
Maruf Farhan RiganUltimate Guide to Linux User Enumeration (For Beginners & Pros!)Why it Matters:5 min read·Mar 25, 2024----
Maruf Farhan RiganThe Art of Linux Local Enumeration: A Hands-on ExplorationIn the world of cybersecurity, understanding a system’s details is crucial. Local enumeration on Linux is the process of gathering…5 min read·Mar 25, 2024----
Maruf Farhan RiganHow to Automate Windows Local EnumerationManually gathering information about a Windows system can be tedious. Automating local enumeration streamlines the process, saving you time…9 min read·Mar 25, 2024----
Maruf Farhan RiganHow Hackers Trick You: Understanding Social Engineering with SETSocial-Engineer Toolkit (SET)4 min read·Mar 20, 2024----
Maruf Farhan RiganBlack Box Penetration Test Day 2: Targeting Microsoft IIS FTPWhat is FTP?5 min read·Feb 5, 2024----
Maruf Farhan RiganBlack Box Penetration Test Day 1: port scanning and Enumeration ( windows)A black box penetration test, often just called black box testing, simulates a real-world attack on a system or network by an external…6 min read·Feb 5, 2024----