WSL privilege escalation

WSL | Windows Privilege Escalation

Table of ContentsIntroduction ManualMetasploitPowerSploitBinary PathReplacing the Service BinaryConclsuion Introduction Windows Subsystem for Linux (WSL) is a cool feature on Windows that lets you run Linux stuff directly...

Continue reading

SSH PENTEST

Pentesting SSH

Table of ContentsIntroduction ManualMetasploitPowerSploitBinary PathReplacing the Service BinaryConclsuion Introduction The SSH protocol, also called Secure Shell, lets you safely and reliably log in from one computer to...

Continue reading

Pentesting FTP

Pentesting FTP

Table of ContentsIntroduction ManualMetasploitPowerSploitBinary PathReplacing the Service BinaryConclsuion Introduction In this article, you will learn how to pentesting FTP Port 21, If you have any doubts comment down...

Continue reading

Pentest Echo Port 7

Pentesting Echo | Port 7

Table of ContentsIntroduction ManualMetasploitPowerSploitBinary PathReplacing the Service BinaryConclsuion Introduction In this article, you will learn how to pentest the Echo, If you have any doubts comment down...

Continue reading

Pentest GDBServer

Pentesting Remote GdbServer

Table of ContentsIntroduction ManualMetasploitPowerSploitBinary PathReplacing the Service BinaryConclsuion Introduction Pentesting Remote GdbServer: Gdbserver is a handy tool that lets you debug programs remotely. It runs...

Continue reading

Pentest VoIP

Pentest VOIP

Table of ContentsIntroduction ManualMetasploitPowerSploitBinary PathReplacing the Service BinaryConclsuion Introduction Hey there! So, guess what we’re diving into today? Pen testing VoIP systems! Yeah, it’s...

Continue reading

Sap

Pentesting SAP

Table of ContentsIntroduction ManualMetasploitPowerSploitBinary PathReplacing the Service BinaryConclsuion Introduction In this article, you will learn how to pentest the SAP, If you have any doubts comment down...

Continue reading