Archives
All the articles I've archived.
-
Generators in Python
Generators are special functions in Python that allow you to declare a function that behaves like an iterator. They enable you to iterate over a potentially ...
-
Session Management and Cookie Security
Session management is the process of securely maintaining a user's state and identity across multiple requests in web applications. Since HTTP is stateless b...
-
Session Fixation Attack
Session fixation is a web security vulnerability that allows an attacker to force a user to use a specific session identifier (session ID). The attack exploi...
-
Active Directory Basics
1. Follow the principle of least privilege 2. Implement proper account tiering 3. Use Protected Users security group for privileged accounts 4. Enable Advanc...
-
Authentication Bypass
Authentication bypass vulnerabilities allow attackers to gain unauthorized access to systems by circumventing authentication mechanisms. This cheatsheet cove...
-
Command Injection
Command injection is a web security vulnerability that allows an attacker to execute arbitrary commands on the host operating system via a vulnerable applica...
-
Cryptography Basics
Introduction to cryptography fundamentals including encryption, decryption, hashing, and key management
-
Brute Forcing with Hydra
Hydra is a fast and flexible online password cracking tool that supports numerous protocols including SSH, FTP, HTTP, SMB, and many others. This cheatsheet p...
-
Active Directory Enumeration
Active Directory (AD) enumeration is a crucial phase during penetration testing that involves gathering information about the AD infrastructure, including do...
-
Content Discovery
Web content discovery techniques using tools like ffuf, gobuster, nikto, and wpscan for enumeration
-
Access Control
Access control is the process of granting or denying specific requests to obtain and use information and related information processing services. It is a fun...
-
Attacking Common Services
This document provides a comprehensive guide for assessing and exploiting common network services during penetration testing. For each service, we'll cover e...
-
Linux Privilege Escalation
Linux privilege escalation techniques including SUID binaries, sudo misconfigurations, and kernel exploits
-
Nmap Firewall & IDS Evasion
Nmap techniques for evading firewalls and intrusion detection systems during network scanning
-
Race Condition
Race conditions are security vulnerabilities that occur when the timing of events affects the correct operation of a system or application. They happen when ...
-
SQL Injection
SQL injection attack vectors and exploitation techniques for database compromise' UNION SELECT 1,2,3 -- - ' UNION SELECT username,password,3 FROM us...
-
Windows Privilege Escalation
This cheatsheet provides a structured methodology for identifying and exploiting Windows privilege escalation vectors. It includes commands, explanations, an...
-
Command and Control (C2) Frameworks
Command and Control (C2) frameworks are software platforms used during red team operations and penetration testing to maintain communication with compromised...
-
Active Directory Breaching Techniques
This cheatsheet focuses on initial access vectors for breaching Active Directory environments. These techniques target the perimeter of an AD forest, allowin...
-
Hash Cracking and Password Attack Techniques
Comprehensive guide to hash cracking and password attack techniques including John the Ripper, Hashcat, and Hydra
-
CSP & Same-Origin Policy Bypass
Content Security Policy (CSP) and Same-Origin Policy (SOP) are critical web security mechanisms designed to prevent various attacks including Cross-Site Scri...
-
Insecure Direct Object References (IDOR)
Insecure Direct Object References (IDOR) is a critical web security vulnerability that occurs when an application exposes a reference to an internal implemen...
-
Cross-Site Request Forgery (CSRF)
Cross-Site Request Forgery (CSRF) is a web security vulnerability that allows an attacker to induce users to perform actions they did not intend to perform. ...
-
JSON Web Token (JWT) Security
JSON Web Tokens (JWTs) are an open standard (RFC 7519) for securely transmitting information between parties as a compact, self-contained JSON object. JWTs a...
-
Local File Inclusion (LFI) & Path Traversal
Local File Inclusion (LFI) and path traversal vulnerabilities for reading sensitive files and remote code execution
-
File Upload Vulnerabilities
File upload vulnerabilities occur when web applications allow users to upload files without properly validating their type, content, size, or name. Successfu...
-
Linux File Transfer Cheatsheet
Comprehensive guide to Linux file transfer techniques including wget, curl, netcat, and Python HTTP servers
-
Metasploit Framework and Meterpreter
Metasploit Framework and Meterpreter payload usage for penetration testing and exploitation
-
NoSQL Injection
NoSQL injection is a security vulnerability that occurs when untrusted data is sent to a NoSQL database interpreter as part of a command or query. Unlike SQL...
-
Essential OSINT Tools and Frameworks
Open Source Intelligence (OSINT) tools and techniques for information gathering and reconnaissance
-
Log Poisoning via User-Agent
Log poisoning is an attack technique where malicious code is injected into server log files which are then executed when the log file is viewed or processed....
-
Network Enumeration with Nmap
Network port scanning techniques and methodologies using Nmap and other tools
-
Passive and Active Reconnaissance
Reconnaissance (recon) is the first phase in a penetration test and involves collecting information about the target systems, networks, and organizations. Th...
-
Red Team Fundamentals and Methodologies
Red teaming is an advanced form of security assessment that simulates real-world attacks against an organization's people, processes, and technology to ident...
-
Shell Upgrade Techniques
During penetration testing, the initial shell you receive after exploitation is often limited in functionality (non-interactive). This document covers techni...
-
SSI (Server-Side Includes) Injection
Server-Side Includes (SSI) are directives in HTML pages that are evaluated on the server before the page is delivered to the client. SSI injection occurs whe...
-
Server-Side Request Forgery (SSRF)
Server-Side Request Forgery (SSRF) is a web security vulnerability that allows attackers to induce the server-side application to make requests to an uninten...
-
Weaponization Techniques for Red Team Operations
Weaponization is a critical phase in red team operations where offensive tools, payloads, and exploits are prepared for deployment against target environment...
-
SSTI (Server-Side Template Injection)
Server-Side Template Injection (SSTI) is a vulnerability that occurs when user input is embedded directly into a template in an unsafe manner. When a web app...
-
Windows File Transfer Cheatsheet
Comprehensive guide to file transfer techniques on Windows systems including PowerShell, certutil, and SMB methods
-
XXE (XML External Entity) Injection
XML External Entity (XXE) injection vulnerabilities and exploitation techniques for reading files and SSRF attacks
-
XSLT Injection
XSLT (Extensible Stylesheet Language Transformations) injection occurs when an attacker can control or modify XSLT stylesheets that are processed by an appli...
-
XSS (Cross-Site Scripting)
Cross-Site Scripting (XSS) is a client-side injection vulnerability that allows attackers to execute malicious JavaScript in victims' browsers. This cheatshe...