Nishant SharmainPentester Academy BlogAnalyzing firmware image using BinwalkFirmware analysis is the process of recovering, extracting, and analyzing the contents of a firmware. A firmware here refers to a software…Aug 5, 2020Aug 5, 2020
Nishant SharmainPentester Academy BlogNetwork Pivoting using Metasploit and ProxychainsNetwork pivoting refers to the process of utilizing a compromised machine, that is connected to multiple networks, to get access to other…Aug 5, 20202Aug 5, 20202
Nishant SharmainPentester Academy BlogAnalyzing Memory Dump with Volatility II.Memory dump analysis is a very important step of the Incident Response process. The RAM (memory) dump of a running compromised machine…Aug 5, 2020Aug 5, 2020
Nishant SharmainPentester Academy BlogRecovering SSH keys from Docker imageIt is a very common practice to use 3rd party Docker images available publicly on DockerHub or other public repositories. However, as this…Aug 5, 2020Aug 5, 2020
Nishant SharmainPentester Academy BlogExploiting Buffer Overflow vulnerability to do Privilege EscalationA buffer overflow occurs when the data provided to the program goes out of the allocated memory space and also corrupts the contents of…Aug 5, 2020Aug 5, 2020
Nishant SharmainPentester Academy BlogAnalyzing Memory Dump with VolatilityMemory dump analysis is a very important step of the Incident Response process. The RAM (memory) dump of a running compromised machine…Aug 5, 2020Aug 5, 2020
Nishant SharmainPentester Academy BlogLearn Basic Podman CommandsPodman is a container engine for developing, managing, and running OCI Containers like Docker. However, it is daemonless and can either be…Jul 29, 20201Jul 29, 20201
Nishant SharmainPentester Academy BlogAbusing Docker Registry to gain access to a mounted VolumeContainers are widely used to develop and deploy applications but due to the temporary nature of the container, it is not advisable to…Jul 28, 2020Jul 28, 2020
Nishant SharmainPentester Academy BlogCracking HMAC-SHA1 key with HashcatThe SHA-1 (Secure Hash Algorithm) is a popular 160-bit hash function standardized by NIST in 1991. It was widely used to hash passwords…Jul 28, 2020Jul 28, 2020
Nishant SharmainPentester Academy BlogHandling repository Preference for APT repositoriesAPT is a management system for software packages. Originally written for Debian and the deb package format and is used on Debian, Ubuntu…Jul 28, 2020Jul 28, 2020