May 2024

Pentesting DNS

Pentesting DNS

Introduction The first thing you do in Pentesting dns is figuring out the target’s IP address. This is called the Recon phase, where the real work begins. Once you have the IP address, you can dig deeper to find out more about the target’s network and the services it’s running on different ports. After that, […]

Pentesting DNS Read More »

pentesting smtp

Pentesting SMTP

Introduction Email spoofing is a way of sending fake emails to people. Criminals use these methods for attacks like phishing or spam, which can create hidden access points that look legitimate. Public email servers can be exploited for spoofing attacks. If your mail server is set up with an OPEN RELAY, attackers can perform these

Pentesting SMTP Read More »

pentest telnet

Pentesting Telnet

Introduction Pentesting Telnet might sound like a throwback to the early days of the internet, but it’s a crucial skill in today’s cybersecurity landscape. Telnet, despite being largely replaced by more secure protocols, still pops up in various network configurations, often as an overlooked vulnerability. In this post, we dive into the essentials of pentesting

Pentesting Telnet Read More »

Weak registry permissions

Weak Registry Permissions | Windows Privilege Escalation

Introduction In this post, you will learn how to exploit weak registry permissions for privilege escalation. If you have any questions, feel free to comment down below. Weak Registry Permissions Enemies posing as regular users can gain higher privileges because of weak registry permissions. They can run their harmful programs by changing the registry keys

Weak Registry Permissions | Windows Privilege Escalation Read More »

Weak Service File Permissions

Weak Service File Permissions | Windows Privilege Escalation

Introduction In this post, you will learn how to exploit weak service file permissions for privilege escalation. If you have any questions, feel free to comment down below. In Windows environments, it’s common to find services running with SYSTEM privileges that lack proper permissions set by the administrator. This misconfiguration can lead to a user

Weak Service File Permissions | Windows Privilege Escalation Read More »

Weak Service Permission | Windows Privilege Escalation

Introduction In this post you will learn how to do privesc the weak service permission and if you have any doubt comment down below. In Windows environments, it’s common to find services running with SYSTEM privileges that lack proper permissions set by the administrator. This can result in a user having permissions over the service

Weak Service Permission | Windows Privilege Escalation Read More »

SSH PENTEST

Pentesting SSH

Introduction The SSH protocol, also called Secure Shell, lets you safely and reliably log in from one computer to another. It provides strong ways to verify identity and protects communication with strong encryption. SSH is a secure alternative to unprotected login methods like telnet and rlogin, as well as unsafe file transfer methods like FTP.

Pentesting SSH Read More »

Pentesting FTP

Pentesting FTP

Introduction In this article, you will learn how to pentesting FTP Port 21, If you have any doubts comment down below. What is FTP FTP (File Transfer Protocol) is a service, or protocol, designed for transferring files between computers using the Transmission Control Protocol/Internet Protocol (TCP/IP). It operates as an Application Layer Protocol within the

Pentesting FTP Read More »