Curso de Hacking Wifi
Hola a todos soy D3Ext, en el dia de hoy traigo un curso totalmente gratuito de hacking wifi hecho por mi mismo. Las cosas se explican desde cero para poder auditar todo tipo de redes wifi. Si tien...
Hola a todos soy D3Ext, en el dia de hoy traigo un curso totalmente gratuito de hacking wifi hecho por mi mismo. Las cosas se explican desde cero para poder auditar todo tipo de redes wifi. Si tien...
Introduction Hi there! Today I bring you a review of a the Bug Bounty Hunter course offered by HackTheBox (HTB), which I have recently completed. I will discuss its main aspects, price and subscr...
Introduction Hi there! Some days back I thought about learning a new language that could was powerful, lightweight, modern and easy to learn. Finally, I decided that Nim was the language I was lo...
Introduction Hi there! After almost one year since last post, today we will be discussing a well-known technique used by Red Teamers and malware developers to make shellcode injection a little bi...
Introduction Hi there! This post is definitely much more special for me since today we’ll use two different tools/projects I’ve coded and are published on my Github, to develop malware in an easi...
Introduction Hi hackers! In this posts we’ll see how threat actors can approach default Windows misconfigurations to elevate from common user to Administrator privileges by bypassing UAC Only...
Introduction Hi there! Today we’ll see a truly excellent way in which we can perform our shellcode injections to avoid allocating memory with RWX permissions. Then we’ll code an example in Golang...
Introduction Hello hackers! On this post we’ll see what ETW is, how this affects red teamers, what can we do against it and much more. Explanation Event Tracing for Windows, also known as ETW, ...
Introduction Hi hackers! Welcome to the 11º malware development post, today we’ll discuss how Metasploit implements the getsystem command to elevate privileges from local administrator to SYSTEM,...
Introduction Hi friends! In this post we will learn how threat hunters use YARA rules to detect potential security risks, how to write them and much more about that. Explanation YARA stands f...