Hi Pentester, Today virtualization with docker is getting interesting for most of the developer to race on making their application compatible to run within docker.
Hi Pentester, I want to share a post exploitation of privilege escalation on the Boot2Docker virtualization. Missed configuration lead to the success of this exploitation.
Another day playing with JWT. I found another way to compromise JWT session during my pentest exercise. During the web enumeration, I found that the
Hi, It is play time. I did hacking exercise to update my knowledge and keep me busy during the weekend. I did small pentest to
Hi Fellows, Lets have fun with web pentesting to exploit them. I am going to share small walkthrough on exploiting local file inclusion vulnerability which
Hi Red Team Today, I am going to share on how to do the post exploitation by abusing the logstash configuration on the victim machine.