Hi Pentester, Today virtualization with docker is getting interesting for most of the developer to race on making their application compatible to run within docker.

Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
by Rio Asmara Suryadi
Hi Pentester, Today virtualization with docker is getting interesting for most of the developer to race on making their application compatible to run within docker.
Hi Pentester, I want to share a post exploitation of privilege escalation on the Boot2Docker virtualization. Missed configuration lead to the success of this exploitation.
Another day playing with JWT. I found another way to compromise JWT session during my pentest exercise. During the web enumeration, I found that the
Hi, It is play time. I did hacking exercise to update my knowledge and keep me busy during the weekend. I did small pentest to
Hi Fellows, Lets have fun with web pentesting to exploit them. I am going to share small walkthrough on exploiting local file inclusion vulnerability which
Hi Red Team Today, I am going to share on how to do the post exploitation by abusing the logstash configuration on the victim machine.