Pwntools Tricks and Examples
Pwntools is a set of utilities and helpful shortcuts for exploiting vulnerable binaries, but it has its merits for additional tools and utilities too. Things like easily packing and unpacking data ...
Pwntools is a set of utilities and helpful shortcuts for exploiting vulnerable binaries, but it has its merits for additional tools and utilities too. Things like easily packing and unpacking data ...
Powershell is really like a third or fourth language to me. I’ve been using Windows long enough to get my way around it, but never having been a Windows administrator by trade I never really used i...
In my experience and personal opinion, Python is the best language by far for needling around with literal bits and bytes when you need that level of control of your data. To me, it’s just an easie...
Oftentimes when I gain shell access to some remote server there may be a service listening on an “unreachable” interface such as the local loopback. Generally if there is a web application which ha...
I wrote a SQLMap tamper script that helped me out in something that vanilla SQLMap could not. The issue was that in order for a SQL Injection to be possible, the payload needed to bypass a preg_mat...
First of all, I’m going to open this entire post by saying that this is for prototyping only. If you can use a python function or python module that has been built and tested properly rather than u...
Nmap is one of the cornerstones of penetration testing. It’s one of, if not the first command you run before you even consider what attack surface to focus on on your target. It’s the way to find o...
To give credit where it is due, I decided to set up a honeypot as inspired by John Hammond. Recently he made a youtube video that described his setup and the resulting display of hundreds of red te...
Everyone has their own methods they follow, and enumeration in general is a bit of an art form. This page will serve as kind of a reminder for myself for when I take a break from it and forget some...
If I find a potential attack vector in which I can use Burpsuite Repeater or something, and I just generally want to work with the command line, I typically will code up a quick python script to in...