Welcome to the wiki where you will find each hacking trick/technique/whatever I have learnt from CTFs, real life apps, reading researches, and news. To get started follow this page where you will find the typical flow that you should follow when pentesting one or more machines: Pentesting Methodology STM Cyber is a great cybersecurity company whose slogan is HACK THE UNHACKABLE. They perform their
Built-in SMB Auth server. Supports NTLMv1, NTLMv2 hashes with Extended Security NTLMSSP by default. Successfully tested from Windows 95 to Server 2012 RC, Samba and Mac OSX Lion. Clear text password is supported for NT4, and LM hashing downgrade when the --lm option is set. This functionality is enabled by default when the tool is launched. Built-in MSSQL Auth server. In order to redirect SQL Auth
NOTE: All the methods I have explained are at your own risk Sponsored by https://swordeye.io swordeye.ioOpen Source Intelligence(OSINT) is one of the first techniques to gather information before the attack. There have been many hacking cases using OSINT in the past. Along with the developing IoT devices, we can collect lots of critical data on the public web. We will be gathering critical data fo
çãããæ®æ®µ Python ã§ã³ã¼ããæ¸ãã¨ãã¯ã¡ããã¨åãæ¸ãã¦ã¾ããã? ã¾ã åã®æ¸ãæ¹ãç¥ããªãå ´å㯠Software Design 2020å¹´ 5æå·ã®ãPython ã§ãåãã§ãã¯ãããããèªãã¨ããã¨æãã¾ãã (宣ä¼)ã ã¬ãã¥ã¼ã®ãæä¼ãããããPython ã§ãåãã§ãã¯ãããã(by @t2y)ãæ²è¼ããã¦ããSDãçºå£²ããã¾ãããåãã³ãã使ã£ã¦ã¿ããæ¹ã«ããããã§ããã¾ãã3.8ã§å°å ¥ããã Protocolãªã©ãç´¹ä»ããã¦ããããã§ã«ä½¿ã£ã¦ããæ¹ã«ããå§ãï¼ / Software Design 2020å¹´5æå· https://t.co/JL5GgO0mcq â tk0miya (@tk0miya) April 18, 2020 ç§ã¯ã³ã¼ãã«åãã¤ãå§ãã¦ãããã 3å¹´ãããã«ãªãã®ã§ããããã¾ã§ã¯åããªãã¨è½ã¡çããªããªã£ã¦ãã¾ãã ã³ã¼ãè¦æ¨¡ãããç¨åº¦å¤§ãã
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}