Skip to content
bughra.dev

Archives

All the articles I've archived.

2025 43
April 43
  • Generators in Python

    Generators are special functions in Python that allow you to declare a function that behaves like an iterator. They enable you to iterate over a potentially ...

  • Session Management and Cookie Security

    Session management is the process of securely maintaining a user's state and identity across multiple requests in web applications. Since HTTP is stateless b...

  • Session Fixation Attack

    Session fixation is a web security vulnerability that allows an attacker to force a user to use a specific session identifier (session ID). The attack exploi...

  • Active Directory Basics

    1. Follow the principle of least privilege 2. Implement proper account tiering 3. Use Protected Users security group for privileged accounts 4. Enable Advanc...

  • Authentication Bypass

    Authentication bypass vulnerabilities allow attackers to gain unauthorized access to systems by circumventing authentication mechanisms. This cheatsheet cove...

  • Command Injection

    Command injection is a web security vulnerability that allows an attacker to execute arbitrary commands on the host operating system via a vulnerable applica...

  • Cryptography Basics

    Introduction to cryptography fundamentals including encryption, decryption, hashing, and key management

  • Brute Forcing with Hydra

    Hydra is a fast and flexible online password cracking tool that supports numerous protocols including SSH, FTP, HTTP, SMB, and many others. This cheatsheet p...

  • Active Directory Enumeration

    Active Directory (AD) enumeration is a crucial phase during penetration testing that involves gathering information about the AD infrastructure, including do...

  • Content Discovery

    Web content discovery techniques using tools like ffuf, gobuster, nikto, and wpscan for enumeration

  • Access Control

    Access control is the process of granting or denying specific requests to obtain and use information and related information processing services. It is a fun...

  • Attacking Common Services

    This document provides a comprehensive guide for assessing and exploiting common network services during penetration testing. For each service, we'll cover e...

  • Linux Privilege Escalation

    Linux privilege escalation techniques including SUID binaries, sudo misconfigurations, and kernel exploits

  • Nmap Firewall & IDS Evasion

    Nmap techniques for evading firewalls and intrusion detection systems during network scanning

  • Race Condition

    Race conditions are security vulnerabilities that occur when the timing of events affects the correct operation of a system or application. They happen when ...

  • SQL Injection

    SQL injection attack vectors and exploitation techniques for database compromise' UNION SELECT 1,2,3 -- - ' UNION SELECT username,password,3 FROM us...

  • Windows Privilege Escalation

    This cheatsheet provides a structured methodology for identifying and exploiting Windows privilege escalation vectors. It includes commands, explanations, an...

  • Command and Control (C2) Frameworks

    Command and Control (C2) frameworks are software platforms used during red team operations and penetration testing to maintain communication with compromised...

  • Active Directory Breaching Techniques

    This cheatsheet focuses on initial access vectors for breaching Active Directory environments. These techniques target the perimeter of an AD forest, allowin...

  • Hash Cracking and Password Attack Techniques

    Comprehensive guide to hash cracking and password attack techniques including John the Ripper, Hashcat, and Hydra

  • CSP & Same-Origin Policy Bypass

    Content Security Policy (CSP) and Same-Origin Policy (SOP) are critical web security mechanisms designed to prevent various attacks including Cross-Site Scri...

  • Insecure Direct Object References (IDOR)

    Insecure Direct Object References (IDOR) is a critical web security vulnerability that occurs when an application exposes a reference to an internal implemen...

  • Cross-Site Request Forgery (CSRF)

    Cross-Site Request Forgery (CSRF) is a web security vulnerability that allows an attacker to induce users to perform actions they did not intend to perform. ...

  • JSON Web Token (JWT) Security

    JSON Web Tokens (JWTs) are an open standard (RFC 7519) for securely transmitting information between parties as a compact, self-contained JSON object. JWTs a...

  • Local File Inclusion (LFI) & Path Traversal

    Local File Inclusion (LFI) and path traversal vulnerabilities for reading sensitive files and remote code execution

  • File Upload Vulnerabilities

    File upload vulnerabilities occur when web applications allow users to upload files without properly validating their type, content, size, or name. Successfu...

  • Linux File Transfer Cheatsheet

    Comprehensive guide to Linux file transfer techniques including wget, curl, netcat, and Python HTTP servers

  • Metasploit Framework and Meterpreter

    Metasploit Framework and Meterpreter payload usage for penetration testing and exploitation

  • NoSQL Injection

    NoSQL injection is a security vulnerability that occurs when untrusted data is sent to a NoSQL database interpreter as part of a command or query. Unlike SQL...

  • Essential OSINT Tools and Frameworks

    Open Source Intelligence (OSINT) tools and techniques for information gathering and reconnaissance

  • Log Poisoning via User-Agent

    Log poisoning is an attack technique where malicious code is injected into server log files which are then executed when the log file is viewed or processed....

  • Network Enumeration with Nmap

    Network port scanning techniques and methodologies using Nmap and other tools

  • Passive and Active Reconnaissance

    Reconnaissance (recon) is the first phase in a penetration test and involves collecting information about the target systems, networks, and organizations. Th...

  • Red Team Fundamentals and Methodologies

    Red teaming is an advanced form of security assessment that simulates real-world attacks against an organization's people, processes, and technology to ident...

  • Shell Upgrade Techniques

    During penetration testing, the initial shell you receive after exploitation is often limited in functionality (non-interactive). This document covers techni...

  • SSI (Server-Side Includes) Injection

    Server-Side Includes (SSI) are directives in HTML pages that are evaluated on the server before the page is delivered to the client. SSI injection occurs whe...

  • Server-Side Request Forgery (SSRF)

    Server-Side Request Forgery (SSRF) is a web security vulnerability that allows attackers to induce the server-side application to make requests to an uninten...

  • Weaponization Techniques for Red Team Operations

    Weaponization is a critical phase in red team operations where offensive tools, payloads, and exploits are prepared for deployment against target environment...

  • SSTI (Server-Side Template Injection)

    Server-Side Template Injection (SSTI) is a vulnerability that occurs when user input is embedded directly into a template in an unsafe manner. When a web app...

  • Windows File Transfer Cheatsheet

    Comprehensive guide to file transfer techniques on Windows systems including PowerShell, certutil, and SMB methods

  • XXE (XML External Entity) Injection

    XML External Entity (XXE) injection vulnerabilities and exploitation techniques for reading files and SSRF attacks

  • XSLT Injection

    XSLT (Extensible Stylesheet Language Transformations) injection occurs when an attacker can control or modify XSLT stylesheets that are processed by an appli...

  • XSS (Cross-Site Scripting)

    Cross-Site Scripting (XSS) is a client-side injection vulnerability that allows attackers to execute malicious JavaScript in victims' browsers. This cheatshe...