Skip to content
  • Tuesday 7th December 2021
    • Medium

    Patch The Net

    One node at a time

    • Home
    • Computer Networking
    • Linux
    • CISSP Prep
    • Posts
    • Contact

    Home ยป Articles

    CSRF (Cross-Site Request Forgery) Explained

    spectnullbyte November 28, 2021

    Cross-Site Request Forgery (CSRF or XSRF), also called Client-Side Request Forgery, is a type of attack that targets web applications. […]

    Regular Expressions

    A Quick Guide To Regular Expressions

    spectnullbyte September 26, 2021

    Regular expressions are present in almost all programming languages (Python, PHP, Javascript…), as well as in Linux commands (grep, sed…) […]

    XSS

    Introduction to Cross-Site Scripting (XSS)

    spectnullbyte August 13, 2021

    This article presents a great introduction for anyone trying to learn about Cross-Site Scripting (or XSS). You don’t need to […]

    Using THC Hydra To Brute Force Login Forms

    spectnullbyte August 6, 2021

    THC Hydra is a powerful tool to use against login forms. It can perform brute force and dictionary attacks against […]

    Linux Privilege Escalation

    Linux Privilege Escalation: Three Easy Ways to Get a Root Shell

    spectnullbyte July 30, 2021

    Once you’ve gained access to a Linux system, the next logical step is to perform privilege escalation. That is, to […]

    john the ripper

    Using John The Ripper To Crack Password Hashes

    spectnullbyte June 29, 2021

    Every self-respecting pentester should have a powerful password cracker in their toolkit, and John the Ripper is simply the best […]

    Using Gobuster to Find Hidden Web Content

    spectnullbyte April 20, 2021

    Directories and Files enumeration is one of the first steps that an attacker performs during web application pentesting. This step […]

    SQL Injection

    Introduction to SQL Injection

    spectnullbyte April 9, 2021

    SQL injection is often referenced as the most common type of attack on websites. It is being used extensively by […]

    Introduction to Malware Analysis

    spectnullbyte March 9, 2021

    In this article, we will try to learn what malware is and how malware analysis works. It is aimed at […]

    How To Use Nmap: A Beginner’s Guide

    spectnullbyte January 19, 2021

    Nmap is an open-source network mapping tool developed by Gordon Lyon. It is widely used as a port scanner and […]

    Posts navigation

      • 1
      • 2
    • Older Older

    Post navigation

    Computer Networking

    Latest Posts

    • November 28, 2021November 28, 2021spectnullbyte

      CSRF (Cross-Site Request Forgery) Explained

    • Regular Expressions
      September 26, 2021September 26, 2021spectnullbyte

      A Quick Guide To Regular Expressions

    • XSS
      August 13, 2021August 13, 2021spectnullbyte

      Introduction to Cross-Site Scripting (XSS)

    • August 6, 2021August 6, 2021spectnullbyte

      Using THC Hydra To Brute Force Login Forms

    • Linux Privilege Escalation
      July 30, 2021July 30, 2021spectnullbyte

      Linux Privilege Escalation: Three Easy Ways to Get a Root Shell

    Newsletter

    Copyright All rights reserved - Patchthenet.com
    • Medium