Hello, Studying some exploitation techniques is always a fun thing. I like to understand how to find an opportunity to exploit or take over a
Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
by Rio Asmara Suryadi
Hello, Studying some exploitation techniques is always a fun thing. I like to understand how to find an opportunity to exploit or take over a
Yeah Fellows, I would like to share interesting one of the way linux privilege escalation in by abusing the shell features. The technique is quite
Hi Guys, I want to create simple notes regarding privilege escalation related to writeable /etc/passwd. Usually, when we have write access to the /etc/passwd then
Hi Guys, I am finally back to write some simple tutorials related to penetration testing. Today, I would like to discuss the privilege escalation using
Hi Friends, Follow up my previous post about the javascript evasion technique that the malware creator uses code obfuscation to bypass the malware protection in
Hi Reverser, Let’s do some stuff. Today I would like to share again about the malware evasion technique. Today, it is a bit different, where