Attacks against databases have become one of the most popular and lucrative activities for hackers recently. New data breaches seem to be popping up e ...
It's been said time and time again: reconnaissance is perhaps the most critical phase of an attack. It's especially important when preparing an attack ...
Samba can be configured to allow any user with write access the ability to create a link to the root filesystem. Once an attacker has this level of ac ...
So you've managed to get a shell on the target, but you only have measly low-level privileges. Now what? Privilege escalation is a vast field and can ...
Post-exploitation information gathering can be a long and drawn-out process, but it is an essential step when trying to pivot or establish advanced pe ...
It is said that the best way to avoid detection when hacking is to leave no trace, and often that means not touching the filesystem at all. But realis ...
Passwords on Windows are stored as hashes, and sometimes they can be tough to crack. In certain situations, though, we can get around that by using th ...
UAC is something we've all dealt with on Windows, either as a user, administrator, or attacker. It's a core feature of the Windows security model, and ...
Particular vulnerabilities and exploits come along and make headlines with their catchy names and impressive potential for damage. EternalBlue is one ...