Skip to content
  • Thursday 9th February 2023
    • Medium

    Patch The Net

    One node at a time

    • Linux
    • Web Application Security
    • Red Teaming
    • CISSP Prep

    Author: A. Boukar

    • Embracing the Power of Linux
    • Linux

    Chapter 9 – Advanced Data Processing

    Processing data on Linux is really simple. Many commands are available for all kinds of text-processing functions. We’ve seen some of these commands in the previous chapter, but their number […]

    View the post
    A. BoukarSeptember 6, 2021September 6, 2021
    Tags: joinLinuxpastesedtr
    • Articles
    • Web Application Security

    Introduction to Cross-Site Scripting (XSS)

    This article presents a great introduction for anyone trying to learn about Cross-Site Scripting (or XSS). You don’t need to be an expert to follow along. However, you do need […]

    View the post
    A. BoukarAugust 13, 2021December 25, 2022
    Tags: cross site scriptingpersistent xssreflected xssweb application hackingxss
    • Embracing the Power of Linux
    • Linux

    Chapter 8 – Extract and Process Data

    In this chapter, we are going to learn how to extract and process data from a file on Linux. To test the examples given in this chapter, I will create […]

    View the post
    A. BoukarAugust 10, 2021August 10, 2021
    Tags: cutgrepLinuxuniqwc
    • Embracing the Power of Linux
    • Linux

    Chapter 7 – Piping and Redirection

    Before we start, don’t be misled by the title of this chapter. I am not going to teach you about plumbing here. We are going to cover piping and redirection […]

    View the post
    A. BoukarAugust 8, 2021August 8, 2021
    Tags: data streamsLinuxpipingredirection
    • Articles
    • Web Application Security

    Using THC Hydra To Brute Force Login Forms

    THC Hydra is a powerful tool to use against login forms. It can perform brute force and dictionary attacks against different types of applications and services. When a web application […]

    View the post
    A. BoukarAugust 6, 2021December 25, 2022
    Tags: brute forcedictionary attackHackingthc hydra
    • Articles
    • Red Teaming

    Linux Privilege Escalation: Three Easy Ways to Get a Root Shell

    Once you’ve gained access to a Linux system, the next logical step is to perform privilege escalation. That is, to go from a user account with limited privileges to a […]

    View the post
    A. BoukarJuly 30, 2021December 25, 2022
    Tags: LinuxPrivilege Escalationroot
    • Articles
    • Red Teaming

    Using John The Ripper To Crack Password Hashes

    Every self-respecting pentester should have a powerful password cracker in their toolkit, and John the Ripper is simply the best cracker out there. Initially released in 1996 by Openwall, John […]

    View the post
    A. BoukarJune 29, 2021December 25, 2022
    Tags: john crackerjohn the ripperpassword cracking
    • Articles
    • Web Application Security

    Using Gobuster to Find Hidden Web Content

    Directories and Files enumeration is one of the first steps that an attacker performs during web application pentesting. This step is necessary to identify potential hidden areas of a website […]

    View the post
    A. BoukarApril 20, 2021December 25, 2022
    Tags: directory enumerationgobusterweb enumeration
    • Articles
    • Web Application Security

    Introduction to SQL Injection

    SQL injection is often referenced as the most common type of attack on websites. It is being used extensively by hackers and pen-testers on web applications. The OWASP Top Ten […]

    View the post
    A. BoukarApril 9, 2021December 25, 2022
    Tags: DatabasesSQLSQL InjectionSQLi
    • Getting Started with Linux
    • Linux

    Chapter 6 – Find Files in Linux

    You should already be aware of how much a search for a file can sometimes feel like looking for a needle in a haystack. Fortunately, finding files on Linux is […]

    View the post
    A. BoukarApril 2, 2021April 2, 2021
    Tags: findLinuxlocate

    Posts navigation

    1 2 3 … 5

    Latest Articles

    • netcal-for-bind-and-reverse-shell
      April 18, 2022December 25, 2022A. Boukar

      Create Bind and Reverse Shells using Netcat

    • SSRF Explained
      April 8, 2022April 8, 2022A. Boukar

      Server-Side Request Forgery (SSRF) Explained

    • Host Header Injection Attack
      February 5, 2022December 25, 2022A. Boukar

      Host Header Injection Attacks

    • http request smuggling attack
      December 31, 2021December 25, 2022A. Boukar

      HTTP Request Smuggling Explained

    • XXE
      December 12, 2021December 25, 2022A. Boukar

      XXE Attacks Explained

    Newsletter

    Recent Posts

    • Create Bind and Reverse Shells using Netcat
    • Server-Side Request Forgery (SSRF) Explained
    • Chapter 12 – Bash Scripting
    • Host Header Injection Attacks
    • HTTP Request Smuggling Explained
    Copyright All rights reserved - Patchthenet.com
    • Medium