PinnedPrajwal PatilinSystem WeaknessHunting Simple Malware using core windows CLI tools.In this article, we will try to find simple malware by using core Windows network command-line tools like net commands, TASKLIST, and WMIC…Apr 7, 2022Apr 7, 2022
PinnedPrajwal PatilinSystem WeaknessWhat is LLMNR Poisoning Attack?What is LLMNR (link-local multicast Name resolution) and NBT-NSApr 13, 2022Apr 13, 2022
PinnedPrajwal PatilActive Directory Enumeration with Powerview scriptwhat is Enumeration?? Enumeration is the process of extracting information like user names, machine names, network resources, shares, and…Apr 24, 2022Apr 24, 2022
Prajwal PatilWindows Privilege Escalation–Startup ApplicationsThe startup folder contains shortcuts to all applications that start when you sign in with your local Windows 10 account. Direct access to…Aug 14, 2022Aug 14, 2022
Prajwal PatilinSystem WeaknessFind command for CTF players/ Penetration testers.The find command is among the most useful tools in the arsenal of Linux system administrators. The find command searches a directory…Aug 11, 2022Aug 11, 2022
Prajwal PatilinSystem WeaknessDifferent types of Vulnerability Classification.A vulnerability is a system flaw or a weakness in the system. Software or hardware misconfiguration and poor development methods are the…Aug 8, 2022Aug 8, 2022
Prajwal PatilinSystem WeaknessLinux Privilege Escalation using PATH Variable manipulationThe second stage of system hacking involves escalating privileges. A privilege escalation attack involves getting additional privileges…Aug 1, 2022Aug 1, 2022
Prajwal PatilLinux privilege escalation by abusing sudoIn Linux, sudo stands for “super user do”. Whenever you execute a command in Linux and prefix it with sudo, it is executed with root…Jul 28, 2022Jul 28, 2022
Prajwal PatilIntro to ARP and ARP spoofing attacks?The Address Resolution Protocol (ARP) is a critical part of networking. It is a stateless TCP/IP protocol that translates IP network…Jul 10, 2022Jul 10, 2022