Learn Ethical Hacking

[Ethical Hacking][bsummary]
latest posts

IPv6 DNS Takeover - Attacking & Exploitation IPV6

IPv6 is enabled by default on Windows networks starting from Windows Vista and Server 2008. This default configuration presents an opportuni...

Understanding Kerberos Authentication and its Attacks

Kerberos is a widely used authentication protocol that ensures secure identity verification within networks. It relies on a trusted third pa...

Postgres Pentest Cheatsheet - Port 5432

nmap -sC -sV --script vuln,vulners --script-args mincvss=7.0 -p5432,5433 -Pn 10.10.10.10 #make sure to check for vulnerable versions Brute...

Ldap Penetration Testing Cheatsheet - Port 389,636

  LDAP - Port 389 or LDAP SSL on Port 636 Nmap Scan map -n -sV --script "ldap* and not brute" -p389,636,3268,3269 10.10.10.10 nma...

Running DeepSeek AI Locally on your PC/Laptop

DeepSeek, a groundbreaking Chinese artificial intelligence (AI) company founded in 2023 by Liang Wenfeng and headquartered in Hangzhou, Zhej...

Android APK Penetration Testing Cheatsheet & Guide

Explore a step-by-step guide to Android APK penetration testing! This blog covers essential techniques such as decompiling APKs, analyzing A...

Understanding PE Headers: A Complete Guide to the Windows Portable Executable Format

Introduction The Portable Executable (PE) format is an essential structure for Windows binaries such as executables (EXE) and dynamic lin...

Jenkins Penetration Test Cheatsheet

Jenkins Penetration Testing Cheatsheet  Jenkins is one of the most widely used open-source automation servers, empowering teams to build, te...

Cheat Sheets

[Cheatsheet][grids]

Learn Hacking Wifi Networks

[How To Hack Wifi][grids]