Skip to content
  • Tuesday 5th July 2022
    • Medium

    Patch The Net

    One node at a time

    • Home
    • Computer Networking
    • Linux
    • CISSP Prep
    • Posts
    • Contact

    Author: A. Boukar

    • Embracing the Power of Linux
    • Linux

    Chapter 9 – Advanced Data Processing

    Processing data on Linux is really simple. Many commands are available for all kinds of text-processing functions. We’ve seen some of these commands in the previous chapter, but their number […]

    View the post
    A. BoukarSeptember 6, 2021September 6, 2021
    Tags: joinLinuxpastesedtr
    • Articles

    Introduction to Cross-Site Scripting (XSS)

    This article presents a great introduction for anyone trying to learn about Cross-Site Scripting (or XSS). You don’t need to be an expert to follow along. However, you do need […]

    View the post
    A. BoukarAugust 13, 2021August 13, 2021
    Tags: cross site scriptingpersistent xssreflected xssweb application hackingxss
    • Embracing the Power of Linux
    • Linux

    Chapter 8 – Extract and Process Data

    In this chapter, we are going to learn how to extract and process data from a file on Linux. To test the examples given in this chapter, I will create […]

    View the post
    A. BoukarAugust 10, 2021August 10, 2021
    Tags: cutgrepLinuxuniqwc
    • Embracing the Power of Linux
    • Linux

    Chapter 7 – Piping and Redirection

    Before we start, don’t be misled by the title of this chapter. I am not going to teach you about plumbing here. We are going to cover piping and redirection […]

    View the post
    A. BoukarAugust 8, 2021August 8, 2021
    Tags: data streamsLinuxpipingredirection
    • Articles

    Using THC Hydra To Brute Force Login Forms

    THC Hydra is a powerful tool to use against login forms. It can perform brute force and dictionary attacks against different types of applications and services. When a web application […]

    View the post
    A. BoukarAugust 6, 2021August 6, 2021
    Tags: brute forcedictionary attackHackingthc hydra
    • Articles

    Linux Privilege Escalation: Three Easy Ways to Get a Root Shell

    Once you’ve gained access to a Linux system, the next logical step is to perform privilege escalation. That is, to go from a user account with limited privileges to a […]

    View the post
    A. BoukarJuly 30, 2021July 30, 2021
    Tags: LinuxPrivilege Escalationroot
    • Articles

    Using John The Ripper To Crack Password Hashes

    Every self-respecting pentester should have a powerful password cracker in their toolkit, and John the Ripper is simply the best cracker out there. Initially released in 1996 by Openwall, John […]

    View the post
    A. BoukarJune 29, 2021June 29, 2021
    Tags: john crackerjohn the ripperpassword cracking
    • Articles

    Using Gobuster to Find Hidden Web Content

    Directories and Files enumeration is one of the first steps that an attacker performs during web application pentesting. This step is necessary to identify potential hidden areas of a website […]

    View the post
    A. BoukarApril 20, 2021April 20, 2021
    Tags: directory enumerationgobusterweb enumeration
    • Articles

    Introduction to SQL Injection

    SQL injection is often referenced as the most common type of attack on websites. It is being used extensively by hackers and pen-testers on web applications. The OWASP Top Ten […]

    View the post
    A. BoukarApril 9, 2021April 9, 2021
    Tags: DatabasesSQLSQL InjectionSQLi
    • Getting Started with Linux
    • Linux

    Chapter 6 – Find Files in Linux

    You should already be aware of how much a search for a file can sometimes feel like looking for a needle in a haystack. Fortunately, finding files on Linux is […]

    View the post
    A. BoukarApril 2, 2021April 2, 2021
    Tags: findLinuxlocate

    Posts navigation

    1 2 3 … 5

    Latest Articles

    • netcal-for-bind-and-reverse-shell
      April 18, 2022April 18, 2022A. Boukar

      Create Bind and Reverse Shells using Netcat

    • SSRF Explained
      April 8, 2022April 8, 2022A. Boukar

      Server-Side Request Forgery (SSRF) Explained

    • Host Header Injection Attack
      February 5, 2022February 5, 2022A. Boukar

      Host Header Injection Attacks

    • http request smuggling attack
      December 31, 2021December 31, 2021A. Boukar

      HTTP Request Smuggling Explained

    • XXE
      December 12, 2021December 12, 2021A. Boukar

      XXE Attacks Explained

    Newsletter

    Recent Posts

    • Create Bind and Reverse Shells using Netcat
    • Server-Side Request Forgery (SSRF) Explained
    • Chapter 12 – Bash Scripting
    • Host Header Injection Attacks
    • HTTP Request Smuggling Explained
    Copyright All rights reserved - Patchthenet.com
    • Medium