THC Hydra is a powerful tool to use against login forms. It can perform brute force and dictionary attacks against different types of applications and services. When a web application […]
Author: spectnullbyte
Linux Privilege Escalation: Three Easy Ways to Get a Root Shell
Once you’ve gained access to a Linux system, the next logical step is to perform privilege escalation. That is, to go from a user account with limited privileges to a […]
Using John The Ripper To Crack Password Hashes
Every self-respecting pentester should have a powerful password cracker in their toolkit, and John the Ripper is simply the best cracker out there. Initially released in 1996 by Openwall, John […]
Using Gobuster to Find Hidden Web Content
Directories and Files enumeration is one of the first steps that an attacker performs during web application pentesting. This step is necessary to identify potential hidden areas of a website […]
Introduction to SQL Injection
SQL injection is often referenced as the most common type of attack on websites. It is being used extensively by hackers and pen-testers on web applications. The OWASP Top Ten […]
Chapter 6 – Find Files in Linux
You should already be aware of how much a search for a file can sometimes feel like looking for a needle in a haystack. Fortunately, finding files on Linux is […]
Introduction to Malware Analysis
In this article, we will try to learn what malware is and how malware analysis works. It is aimed at complete beginners who have never tried malware analysis before. If […]
Chapter 5 – Users and Permissions
So far, you’ve been using the same user account you’ve created during the installation of Linux. That’s fine as long as you’re the only one using your machine. But what […]
Chapter 4 – Interacting with Files and Directories
By the end of this chapter, you will be able to handle on your own most of the day-to-day operations. You will learn how to create, move, copy, and remove […]
Chapter 3 – The Linux Command-Line
In this chapter, you will make your first steps in the Linux command-line environment. If you’re a long time Windows user, then this is your chance to explore a new […]





