Skip to content
  • Tuesday 25th January 2022
    • Medium

    Patch The Net

    One node at a time

    • Home
    • Computer Networking
    • Linux
    • CISSP Prep
    • Posts
    • Contact

    Author: spectnullbyte

    • Articles

    Using THC Hydra To Brute Force Login Forms

    THC Hydra is a powerful tool to use against login forms. It can perform brute force and dictionary attacks against different types of applications and services. When a web application […]

    View the post
    spectnullbyteAugust 6, 2021August 6, 2021
    Tags: brute forcedictionary attackHackingthc hydra
    • Articles

    Linux Privilege Escalation: Three Easy Ways to Get a Root Shell

    Once you’ve gained access to a Linux system, the next logical step is to perform privilege escalation. That is, to go from a user account with limited privileges to a […]

    View the post
    spectnullbyteJuly 30, 2021July 30, 2021
    Tags: LinuxPrivilege Escalationroot
    • Articles

    Using John The Ripper To Crack Password Hashes

    Every self-respecting pentester should have a powerful password cracker in their toolkit, and John the Ripper is simply the best cracker out there. Initially released in 1996 by Openwall, John […]

    View the post
    spectnullbyteJune 29, 2021June 29, 2021
    Tags: john crackerjohn the ripperpassword cracking
    • Articles

    Using Gobuster to Find Hidden Web Content

    Directories and Files enumeration is one of the first steps that an attacker performs during web application pentesting. This step is necessary to identify potential hidden areas of a website […]

    View the post
    spectnullbyteApril 20, 2021April 20, 2021
    Tags: directory enumerationgobusterweb enumeration
    • Articles

    Introduction to SQL Injection

    SQL injection is often referenced as the most common type of attack on websites. It is being used extensively by hackers and pen-testers on web applications. The OWASP Top Ten […]

    View the post
    spectnullbyteApril 9, 2021April 9, 2021
    Tags: DatabasesSQLSQL InjectionSQLi
    • Getting Started with Linux
    • Linux

    Chapter 6 – Find Files in Linux

    You should already be aware of how much a search for a file can sometimes feel like looking for a needle in a haystack. Fortunately, finding files on Linux is […]

    View the post
    spectnullbyteApril 2, 2021April 2, 2021
    Tags: findLinuxlocate
    • Articles

    Introduction to Malware Analysis

    In this article, we will try to learn what malware is and how malware analysis works. It is aimed at complete beginners who have never tried malware analysis before. If […]

    View the post
    spectnullbyteMarch 9, 2021March 9, 2021
    Tags: MalwareMalware AnalysisMalware Analysis Techniques
    • Getting Started with Linux
    • Linux

    Chapter 5 – Users and Permissions

    So far, you’ve been using the same user account you’ve created during the installation of Linux. That’s fine as long as you’re the only one using your machine. But what […]

    View the post
    spectnullbyteJanuary 28, 2021January 28, 2021
    Tags: LinuxpermissionsUsers
    • Getting Started with Linux
    • Linux

    Chapter 4 – Interacting with Files and Directories

    By the end of this chapter, you will be able to handle on your own most of the day-to-day operations. You will learn how to create, move, copy, and remove […]

    View the post
    spectnullbyteJanuary 25, 2021August 7, 2021
    Tags: files and directoriesLinuxnanotext editing
    • Getting Started with Linux
    • Linux

    Chapter 3 – The Linux Command-Line

    In this chapter, you will make your first steps in the Linux command-line environment. If you’re a long time Windows user, then this is your chance to explore a new […]

    View the post
    spectnullbyteJanuary 22, 2021January 25, 2021
    Tags: command-linelinux command promptlinux shell

    Posts navigation

    1 2 3 … 5

    Latest Posts

    • http request smuggling attack
      December 31, 2021December 31, 2021spectnullbyte

      HTTP Request Smuggling Explained

    • XXE
      December 12, 2021December 12, 2021spectnullbyte

      XXE Attacks Explained

    • November 28, 2021November 28, 2021spectnullbyte

      CSRF (Cross-Site Request Forgery) Explained

    • Regular Expressions
      September 26, 2021September 26, 2021spectnullbyte

      A Quick Guide To Regular Expressions

    • XSS
      August 13, 2021August 13, 2021spectnullbyte

      Introduction to Cross-Site Scripting (XSS)

    Newsletter

    Copyright All rights reserved - Patchthenet.com
    • Medium