Hello, Studying some exploitation techniques is always a fun thing. I like to understand how to find an opportunity to exploit or take over a
Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
by Rio Asmara Suryadi
Hello, Studying some exploitation techniques is always a fun thing. I like to understand how to find an opportunity to exploit or take over a
Yeah Fellows, I would like to share interesting one of the way linux privilege escalation in by abusing the shell features. The technique is quite
Hi Guys, I want to create simple notes regarding privilege escalation related to writeable /etc/passwd. Usually, when we have write access to the /etc/passwd then
Hi Guys, I am finally back to write some simple tutorials related to penetration testing. Today, I would like to discuss the privilege escalation using
I am going to share the common mistake of Web API. When I was a software developer a long time ago, We need to develop
Hi Guy, I want to share my experience during my pentest exercise, either in the lab or in the real environment. I write this article