I’ve been reading up on this as I prepare for my OSCP certification – there is no shortage of different attack vectors and chaining of exploits when it comes to getting ready. One of these is Local File Inclusion (LFI). Please note that this can apply to different platforms but for this blog post, weContinue reading “LFI to RCE”
No credentials? No problem! …well, maybe. If a web application is vulnerable to SQL injection (SQLi), you may be able to bypass authentication. A typical SQL query is like the following: SELECT * FROM table WHERE username = ‘bob’ AND password = ‘Str0ngP@ssw0rd!’; Usually you can start to test for the existence of this vulnerabilityContinue reading “SQL Authentication Bypass”
Many say it – methodology is important–if not critical! In this post I’ll quickly cover the hacking phases but what’s more paramount to success is being cyclical in your process. What the typical hacking methodology looks like: Recon Enumeration and Scanning Exploitation (Foothold then Privilege Escalation) Persistence Covering Tracks Lateral Movement This is a greatContinue reading “Enumeration is cyclical”
This is going to be one of those posts that some may scratch their head at and say, “why is he bothering to write this?” And this will not be the last of these types of posts – I promise you that. The fact of the matter is that people getting into hacking (ethical IContinue reading “Easy Credentials”
Like many before me and, I’m sure, many after me – I am in pursuit of the gold standard entry-level pentester certification–the Offensive Security Certified Professional (OSCP). I label this post as “short-term” as I have been studying on and off for awhile but this is something I want for myself by EOY 2021. ThisContinue reading “Short-term goals… OSCP”
Follow My Blog
Get new content delivered directly to your inbox.
If you like my content and feel it adds value, please consider contributing: