Hi, It is play time. I did hacking exercise to update my knowledge and keep me busy during the weekend. I did small pentest to

Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
by Rio Asmara Suryadi
Hi, It is play time. I did hacking exercise to update my knowledge and keep me busy during the weekend. I did small pentest to
Hi Fellows, Lets have fun with web pentesting to exploit them. I am going to share small walkthrough on exploiting local file inclusion vulnerability which
Hi Red Team Today, I am going to share on how to do the post exploitation by abusing the logstash configuration on the victim machine.
Hi, I am going to share on how to exploit JWT during the Pentest. Basically, I would share on how to compromise the JWT session
Hi .. Another post-exploitation that is very easy to be executed is using Linux USBCreator. The vulnerability allows an attacker to overwrite arbitrary files with
Hi Brother, I want to share a short journey during my Pentesting in the lab to keep me updated. I want to share the vulnerability