<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>bughra.dev</title><description>Offensive Security Blog</description><link>https://bughra.dev/</link><item><title>Generators in Python</title><link>https://bughra.dev/posts/generators-in-python/</link><guid isPermaLink="true">https://bughra.dev/posts/generators-in-python/</guid><description>Generators are special functions in Python that allow you to declare a function that behaves like an iterator. They enable you to iterate over a potentially ...</description><pubDate>Wed, 23 Apr 2025 00:00:00 GMT</pubDate></item><item><title>Session Management and Cookie Security</title><link>https://bughra.dev/posts/session-management/</link><guid isPermaLink="true">https://bughra.dev/posts/session-management/</guid><description>Session management is the process of securely maintaining a user&apos;s state and identity across multiple requests in web applications. Since HTTP is stateless b...</description><pubDate>Fri, 11 Apr 2025 00:00:00 GMT</pubDate></item><item><title>Session Fixation Attack</title><link>https://bughra.dev/posts/session-fixation/</link><guid isPermaLink="true">https://bughra.dev/posts/session-fixation/</guid><description>Session fixation is a web security vulnerability that allows an attacker to force a user to use a specific session identifier (session ID). The attack exploi...</description><pubDate>Fri, 11 Apr 2025 00:00:00 GMT</pubDate></item><item><title>Active Directory Basics</title><link>https://bughra.dev/posts/active-directory-basics/</link><guid isPermaLink="true">https://bughra.dev/posts/active-directory-basics/</guid><description>1. Follow the principle of least privilege 2. Implement proper account tiering 3. Use Protected Users security group for privileged accounts 4. Enable Advanc...</description><pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate></item><item><title>Authentication Bypass</title><link>https://bughra.dev/posts/authentication-bypass/</link><guid isPermaLink="true">https://bughra.dev/posts/authentication-bypass/</guid><description>Authentication bypass vulnerabilities allow attackers to gain unauthorized access to systems by circumventing authentication mechanisms. This cheatsheet cove...</description><pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate></item><item><title>Command Injection</title><link>https://bughra.dev/posts/command-injection/</link><guid isPermaLink="true">https://bughra.dev/posts/command-injection/</guid><description>Command injection is a web security vulnerability that allows an attacker to execute arbitrary commands on the host operating system via a vulnerable applica...</description><pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate></item><item><title>Cryptography Basics</title><link>https://bughra.dev/posts/cryptography-basics/</link><guid isPermaLink="true">https://bughra.dev/posts/cryptography-basics/</guid><description>Introduction to cryptography fundamentals including encryption, decryption, hashing, and key management</description><pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate></item><item><title>Brute Forcing with Hydra</title><link>https://bughra.dev/posts/brute-forcing-with-hydra/</link><guid isPermaLink="true">https://bughra.dev/posts/brute-forcing-with-hydra/</guid><description>Hydra is a fast and flexible online password cracking tool that supports numerous protocols including SSH, FTP, HTTP, SMB, and many others. This cheatsheet p...</description><pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate></item><item><title>Active Directory Enumeration</title><link>https://bughra.dev/posts/active-directory-enumeration/</link><guid isPermaLink="true">https://bughra.dev/posts/active-directory-enumeration/</guid><description>Active Directory (AD) enumeration is a crucial phase during penetration testing that involves gathering information about the AD infrastructure, including do...</description><pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate></item><item><title>Content Discovery</title><link>https://bughra.dev/posts/content-discovery/</link><guid isPermaLink="true">https://bughra.dev/posts/content-discovery/</guid><description>Web content discovery techniques using tools like ffuf, gobuster, nikto, and wpscan for enumeration</description><pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate></item><item><title>Access Control</title><link>https://bughra.dev/posts/access-control/</link><guid isPermaLink="true">https://bughra.dev/posts/access-control/</guid><description>Access control is the process of granting or denying specific requests to obtain and use information and related information processing services. It is a fun...</description><pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate></item><item><title>Attacking Common Services</title><link>https://bughra.dev/posts/attacking-common-services/</link><guid isPermaLink="true">https://bughra.dev/posts/attacking-common-services/</guid><description>This document provides a comprehensive guide for assessing and exploiting common network services during penetration testing. For each service, we&apos;ll cover e...</description><pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate></item><item><title>Linux Privilege Escalation</title><link>https://bughra.dev/posts/linux-privilege-escalation/</link><guid isPermaLink="true">https://bughra.dev/posts/linux-privilege-escalation/</guid><description>Linux privilege escalation techniques including SUID binaries, sudo misconfigurations, and kernel exploits</description><pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate></item><item><title>Nmap Firewall &amp; IDS Evasion</title><link>https://bughra.dev/posts/nmap-firewall-ids-evasion/</link><guid isPermaLink="true">https://bughra.dev/posts/nmap-firewall-ids-evasion/</guid><description>Nmap techniques for evading firewalls and intrusion detection systems during network scanning</description><pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate></item><item><title>Race Condition</title><link>https://bughra.dev/posts/race-condition/</link><guid isPermaLink="true">https://bughra.dev/posts/race-condition/</guid><description>Race conditions are security vulnerabilities that occur when the timing of events affects the correct operation of a system or application. They happen when ...</description><pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate></item><item><title>SQL Injection</title><link>https://bughra.dev/posts/sql-injection/</link><guid isPermaLink="true">https://bughra.dev/posts/sql-injection/</guid><description>SQL injection attack vectors and exploitation techniques for database compromise&apos; UNION SELECT 1,2,3 -- - &apos; UNION SELECT username,password,3 FROM us...</description><pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate></item><item><title>Windows Privilege Escalation</title><link>https://bughra.dev/posts/windows-privilege-escalation/</link><guid isPermaLink="true">https://bughra.dev/posts/windows-privilege-escalation/</guid><description>This cheatsheet provides a structured methodology for identifying and exploiting Windows privilege escalation vectors. It includes commands, explanations, an...</description><pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate></item><item><title>Command and Control (C2) Frameworks</title><link>https://bughra.dev/posts/c2/</link><guid isPermaLink="true">https://bughra.dev/posts/c2/</guid><description>Command and Control (C2) frameworks are software platforms used during red team operations and penetration testing to maintain communication with compromised...</description><pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate></item><item><title>Active Directory Breaching Techniques</title><link>https://bughra.dev/posts/active-directory-breaching/</link><guid isPermaLink="true">https://bughra.dev/posts/active-directory-breaching/</guid><description>This cheatsheet focuses on initial access vectors for breaching Active Directory environments. These techniques target the perimeter of an AD forest, allowin...</description><pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate></item><item><title>Hash Cracking and Password Attack Techniques</title><link>https://bughra.dev/posts/hash-cracking/</link><guid isPermaLink="true">https://bughra.dev/posts/hash-cracking/</guid><description>Comprehensive guide to hash cracking and password attack techniques including John the Ripper, Hashcat, and Hydra</description><pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate></item><item><title>CSP &amp; Same-Origin Policy Bypass</title><link>https://bughra.dev/posts/csp-same-origin/</link><guid isPermaLink="true">https://bughra.dev/posts/csp-same-origin/</guid><description>Content Security Policy (CSP) and Same-Origin Policy (SOP) are critical web security mechanisms designed to prevent various attacks including Cross-Site Scri...</description><pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate></item><item><title>Insecure Direct Object References (IDOR)</title><link>https://bughra.dev/posts/idor/</link><guid isPermaLink="true">https://bughra.dev/posts/idor/</guid><description>Insecure Direct Object References (IDOR) is a critical web security vulnerability that occurs when an application exposes a reference to an internal implemen...</description><pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate></item><item><title>Cross-Site Request Forgery (CSRF)</title><link>https://bughra.dev/posts/csrf/</link><guid isPermaLink="true">https://bughra.dev/posts/csrf/</guid><description>Cross-Site Request Forgery (CSRF) is a web security vulnerability that allows an attacker to induce users to perform actions they did not intend to perform. ...</description><pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate></item><item><title>JSON Web Token (JWT) Security</title><link>https://bughra.dev/posts/jwt/</link><guid isPermaLink="true">https://bughra.dev/posts/jwt/</guid><description>JSON Web Tokens (JWTs) are an open standard (RFC 7519) for securely transmitting information between parties as a compact, self-contained JSON object. JWTs a...</description><pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate></item><item><title>Local File Inclusion (LFI) &amp; Path Traversal</title><link>https://bughra.dev/posts/lfi/</link><guid isPermaLink="true">https://bughra.dev/posts/lfi/</guid><description>Local File Inclusion (LFI) and path traversal vulnerabilities for reading sensitive files and remote code execution</description><pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate></item><item><title>File Upload Vulnerabilities</title><link>https://bughra.dev/posts/file-upload/</link><guid isPermaLink="true">https://bughra.dev/posts/file-upload/</guid><description>File upload vulnerabilities occur when web applications allow users to upload files without properly validating their type, content, size, or name. Successfu...</description><pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate></item><item><title>Linux File Transfer Cheatsheet</title><link>https://bughra.dev/posts/linux-file-transfer/</link><guid isPermaLink="true">https://bughra.dev/posts/linux-file-transfer/</guid><description>Comprehensive guide to Linux file transfer techniques including wget, curl, netcat, and Python HTTP servers</description><pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate></item><item><title>Metasploit Framework and Meterpreter</title><link>https://bughra.dev/posts/metasploit/</link><guid isPermaLink="true">https://bughra.dev/posts/metasploit/</guid><description>Metasploit Framework and Meterpreter payload usage for penetration testing and exploitation</description><pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate></item><item><title>NoSQL Injection</title><link>https://bughra.dev/posts/no-sql/</link><guid isPermaLink="true">https://bughra.dev/posts/no-sql/</guid><description>NoSQL injection is a security vulnerability that occurs when untrusted data is sent to a NoSQL database interpreter as part of a command or query. Unlike SQL...</description><pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate></item><item><title>Essential OSINT Tools and Frameworks</title><link>https://bughra.dev/posts/osint/</link><guid isPermaLink="true">https://bughra.dev/posts/osint/</guid><description>Open Source Intelligence (OSINT) tools and techniques for information gathering and reconnaissance</description><pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate></item><item><title>Log Poisoning via User-Agent</title><link>https://bughra.dev/posts/log-poison/</link><guid isPermaLink="true">https://bughra.dev/posts/log-poison/</guid><description>Log poisoning is an attack technique where malicious code is injected into server log files which are then executed when the log file is viewed or processed....</description><pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate></item><item><title>Network Enumeration with Nmap</title><link>https://bughra.dev/posts/port-scanning/</link><guid isPermaLink="true">https://bughra.dev/posts/port-scanning/</guid><description>Network port scanning techniques and methodologies using Nmap and other tools</description><pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate></item><item><title>Passive and Active Reconnaissance</title><link>https://bughra.dev/posts/passive-and-active-recon/</link><guid isPermaLink="true">https://bughra.dev/posts/passive-and-active-recon/</guid><description>Reconnaissance (recon) is the first phase in a penetration test and involves collecting information about the target systems, networks, and organizations. Th...</description><pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate></item><item><title>Red Team Fundamentals and Methodologies</title><link>https://bughra.dev/posts/red-teaming/</link><guid isPermaLink="true">https://bughra.dev/posts/red-teaming/</guid><description>Red teaming is an advanced form of security assessment that simulates real-world attacks against an organization&apos;s people, processes, and technology to ident...</description><pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate></item><item><title>Shell Upgrade Techniques</title><link>https://bughra.dev/posts/shell/</link><guid isPermaLink="true">https://bughra.dev/posts/shell/</guid><description>During penetration testing, the initial shell you receive after exploitation is often limited in functionality (non-interactive). This document covers techni...</description><pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate></item><item><title>SSI (Server-Side Includes) Injection</title><link>https://bughra.dev/posts/ssi/</link><guid isPermaLink="true">https://bughra.dev/posts/ssi/</guid><description>Server-Side Includes (SSI) are directives in HTML pages that are evaluated on the server before the page is delivered to the client. SSI injection occurs whe...</description><pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate></item><item><title>Server-Side Request Forgery (SSRF)</title><link>https://bughra.dev/posts/ssrf/</link><guid isPermaLink="true">https://bughra.dev/posts/ssrf/</guid><description>Server-Side Request Forgery (SSRF) is a web security vulnerability that allows attackers to induce the server-side application to make requests to an uninten...</description><pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate></item><item><title>Weaponization Techniques for Red Team Operations</title><link>https://bughra.dev/posts/weaponization/</link><guid isPermaLink="true">https://bughra.dev/posts/weaponization/</guid><description>Weaponization is a critical phase in red team operations where offensive tools, payloads, and exploits are prepared for deployment against target environment...</description><pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate></item><item><title>SSTI (Server-Side Template Injection)</title><link>https://bughra.dev/posts/ssti/</link><guid isPermaLink="true">https://bughra.dev/posts/ssti/</guid><description>Server-Side Template Injection (SSTI) is a vulnerability that occurs when user input is embedded directly into a template in an unsafe manner. When a web app...</description><pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate></item><item><title>Windows File Transfer Cheatsheet</title><link>https://bughra.dev/posts/windows-file-transfer/</link><guid isPermaLink="true">https://bughra.dev/posts/windows-file-transfer/</guid><description>Comprehensive guide to file transfer techniques on Windows systems including PowerShell, certutil, and SMB methods</description><pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate></item><item><title>XXE (XML External Entity) Injection</title><link>https://bughra.dev/posts/xml/</link><guid isPermaLink="true">https://bughra.dev/posts/xml/</guid><description>XML External Entity (XXE) injection vulnerabilities and exploitation techniques for reading files and SSRF attacks</description><pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate></item><item><title>XSLT Injection</title><link>https://bughra.dev/posts/xslt/</link><guid isPermaLink="true">https://bughra.dev/posts/xslt/</guid><description>XSLT (Extensible Stylesheet Language Transformations) injection occurs when an attacker can control or modify XSLT stylesheets that are processed by an appli...</description><pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate></item><item><title>XSS (Cross-Site Scripting)</title><link>https://bughra.dev/posts/xss/</link><guid isPermaLink="true">https://bughra.dev/posts/xss/</guid><description>Cross-Site Scripting (XSS) is a client-side injection vulnerability that allows attackers to execute malicious JavaScript in victims&apos; browsers. This cheatshe...</description><pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate></item></channel></rss>