Skip to content
  • Wednesday 22nd March 2023
    • Medium

    Patch The Net

    One node at a time

    • Linux
    • Web Application Security
    • Red Teaming
    • CISSP Prep

    Category: Articles

    • Articles
    • Red Teaming

    Create Bind and Reverse Shells using Netcat

    Netcat (nc, ncat, or the swiss army knife of networking, as some might prefer to call it) is a command-line utility that every self-respecting pentester should carry under their belt. […]

    View the post
    A. BoukarApril 18, 2022December 25, 2022
    Tags: mkfifonetcatreverse shellshell
    • Articles
    • Web Application Security

    Server-Side Request Forgery (SSRF) Explained

    Server-Side Request Forgery (or SSRF) is an attack that consists of inducing a web application to send back-end requests to an unintended destination. Driven by the increasing popularity of Cloud […]

    View the post
    A. BoukarApril 8, 2022April 8, 2022
    Tags: Server Side Request ForgerySSRFSSRF Attack
    • Articles
    • Web Application Security

    Host Header Injection Attacks

    Host Header injection is not the type of attack that you would normally find in CTFs or security challenges. However, it is largely widespread in the wild web. It is […]

    View the post
    A. BoukarFebruary 5, 2022December 25, 2022
    Tags: host headerhost header attackhost header injectionhttp host header
    • Articles
    • Web Application Security

    HTTP Request Smuggling Explained

    HTTP Request Smuggling (HRS) is a type of attack that is gaining more and more attention in recent years. Its rise is fueled by the high prevalence of Cloud-based applications […]

    View the post
    A. BoukarDecember 31, 2021December 25, 2022
    Tags: HRS AttackHTTP Request SmugglingHTTP Smuggling
    • Articles
    • Web Application Security

    XXE Attacks Explained

    Out of the many attacks that threaten web applications today, XXE remains the one that is talked about the least. Although it gets far less attention than XSS or SQL […]

    View the post
    A. BoukarDecember 12, 2021December 25, 2022
    Tags: XML eXternal EntitiesXXEXXE AttackXXE Vulnerability
    • Articles
    • Web Application Security

    CSRF (Cross-Site Request Forgery) Explained

    Cross-Site Request Forgery (CSRF or XSRF), also called Client-Side Request Forgery, is a type of attack that targets web applications. It allows an attacker to induce users into accessing and […]

    View the post
    A. BoukarNovember 28, 2021December 25, 2022
    Tags: client-side request forgerycross-site request forgerycsrfcsrf attack
    • Articles

    A Quick Guide To Regular Expressions

    Regular expressions are present in almost all programming languages (Python, PHP, Javascript…), as well as in Linux commands (grep, sed…) and in many other high-level languages and applications. So, why […]

    View the post
    A. BoukarSeptember 26, 2021September 26, 2021
    Tags: regexregular expressionRegular expressions
    • Articles
    • Web Application Security

    Introduction to Cross-Site Scripting (XSS)

    This article presents a great introduction for anyone trying to learn about Cross-Site Scripting (or XSS). You don’t need to be an expert to follow along. However, you do need […]

    View the post
    A. BoukarAugust 13, 2021December 25, 2022
    Tags: cross site scriptingpersistent xssreflected xssweb application hackingxss
    • Articles
    • Web Application Security

    Using THC Hydra To Brute Force Login Forms

    THC Hydra is a powerful tool to use against login forms. It can perform brute force and dictionary attacks against different types of applications and services. When a web application […]

    View the post
    A. BoukarAugust 6, 2021December 25, 2022
    Tags: brute forcedictionary attackHackingthc hydra
    • Articles
    • Red Teaming

    Linux Privilege Escalation: Three Easy Ways to Get a Root Shell

    Once you’ve gained access to a Linux system, the next logical step is to perform privilege escalation. That is, to go from a user account with limited privileges to a […]

    View the post
    A. BoukarJuly 30, 2021December 25, 2022
    Tags: LinuxPrivilege Escalationroot

    Posts navigation

    1 2

    Latest Articles

    • netcal-for-bind-and-reverse-shell
      April 18, 2022December 25, 2022A. Boukar

      Create Bind and Reverse Shells using Netcat

    • SSRF Explained
      April 8, 2022April 8, 2022A. Boukar

      Server-Side Request Forgery (SSRF) Explained

    • Host Header Injection Attack
      February 5, 2022December 25, 2022A. Boukar

      Host Header Injection Attacks

    • http request smuggling attack
      December 31, 2021December 25, 2022A. Boukar

      HTTP Request Smuggling Explained

    • XXE
      December 12, 2021December 25, 2022A. Boukar

      XXE Attacks Explained

    Newsletter

    Recent Posts

    • Create Bind and Reverse Shells using Netcat
    • Server-Side Request Forgery (SSRF) Explained
    • Chapter 12 – Bash Scripting
    • Host Header Injection Attacks
    • HTTP Request Smuggling Explained
    Copyright All rights reserved - Patchthenet.com
    • Medium