Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Hello,

 

I'm get bored with Fritzbox and decided to swtich on OpenWRT - it is where the short story begin..

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Hello all,

This type of posts will be a small technical notes about abusing/exploiting something. Just to not forget =)

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Greetings!

Few weeks ago I finished a very interesting Vulnhub.com boot2root challenge named Cyberry.

This challenge contains a logic task and that's why I was close to give up with this challenge, but finally it was solved and I found it really nice and interesting. Welcome to this post and see how I did it.

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Hello all!

After New Year vacation (3 weeks) it is a good start of the new 2018 with new Vulnhub.com boot2root challenge, today it is CTF-USV 2017

If you are interested in the way how I found all flags - welcome!

User Rating: 5 / 5

Star ActiveStar ActiveStar ActiveStar ActiveStar Active

Hello all!

This week I found new boot2root challenge on https://www.vulnhub.com. The name is TheEther: EvilScience.

Why I decided to write about it? It contains really interesting exploitation way, if you are interested in the way how to pwn it - welcome!

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

It is a story from the past, but I decided to create short how-to exploit it with crossdomain-exploitation-framework

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Hello All,

So, I decided to refresh my knowledge about pentesting VoIP and test viproy against old VulnVoIP image. You can download it from https://www.rebootuser.com/?p=1069

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

This vulnerable VM image can be obtained from https://www.notsosecure.com/vulnerable-docker-vm/

The main idea of this write-up is to share some useful tricks and learn more about docker security.

User Rating: 5 / 5

Star ActiveStar ActiveStar ActiveStar ActiveStar Active

Sorry for a long time without posts, I changed the job and now don't have enough time to create posts, but will do it when will have a time, because have a lot of interesting information to share.

What is it Syn Flood attack? You can find here: https://en.wikipedia.org/wiki/SYN_flood

Main goal of this short how-to is to provide simple steps on how to be protected from this type of attacks.

User Rating: 5 / 5

Star ActiveStar ActiveStar ActiveStar ActiveStar Active

During last forensic process found very good plugin for volatility, which do findings persistence points more comfortable.

User Rating: 5 / 5

Star ActiveStar ActiveStar ActiveStar ActiveStar Active

A little how-to about sip text messages in Asterisk, SIMPLE protocol. Including how-to for freepbx.