Skip to content
  • Thursday 9th February 2023
    • Medium

    Patch The Net

    One node at a time

    • Linux
    • Web Application Security
    • Red Teaming
    • CISSP Prep

    Category: Articles

    • Articles
    • Red Teaming

    Using John The Ripper To Crack Password Hashes

    Every self-respecting pentester should have a powerful password cracker in their toolkit, and John the Ripper is simply the best cracker out there. Initially released in 1996 by Openwall, John […]

    View the post
    A. BoukarJune 29, 2021December 25, 2022
    Tags: john crackerjohn the ripperpassword cracking
    • Articles
    • Web Application Security

    Using Gobuster to Find Hidden Web Content

    Directories and Files enumeration is one of the first steps that an attacker performs during web application pentesting. This step is necessary to identify potential hidden areas of a website […]

    View the post
    A. BoukarApril 20, 2021December 25, 2022
    Tags: directory enumerationgobusterweb enumeration
    • Articles
    • Web Application Security

    Introduction to SQL Injection

    SQL injection is often referenced as the most common type of attack on websites. It is being used extensively by hackers and pen-testers on web applications. The OWASP Top Ten […]

    View the post
    A. BoukarApril 9, 2021December 25, 2022
    Tags: DatabasesSQLSQL InjectionSQLi
    • Articles
    • Blue Teaming

    Introduction to Malware Analysis

    In this article, we will try to learn what malware is and how malware analysis works. It is aimed at complete beginners who have never tried malware analysis before. If […]

    View the post
    A. BoukarMarch 9, 2021December 25, 2022
    Tags: MalwareMalware AnalysisMalware Analysis Techniques
    • Articles
    • Red Teaming

    How To Use Nmap: A Beginner’s Guide

    Nmap is an open-source network mapping tool developed by Gordon Lyon. It is widely used as a port scanner and a host discovery tool by network administrators and hackers world-wide. […]

    View the post
    A. BoukarJanuary 19, 2021December 25, 2022
    Tags: how to use nmapnetwork hackingnmapport scanning
    • Articles
    • Red Teaming

    Overthewire, Learn Hacking By Playing Games

    If you’ve spent enough time on the web searching for practical resources to learn how to hack, then you should know by now what a hustle it is to find […]

    View the post
    A. BoukarJanuary 13, 2021December 25, 2022
    Tags: CTFsHackingoverthewirewargames
    • Articles
    • Red Teaming

    Google Dorks Explained

    Whenever you want to look for something on the Internet, you use Google. The giant search engine indexes almost everything on the web. It has made billions of web pages […]

    View the post
    A. BoukarJanuary 7, 2021December 25, 2022
    Tags: Google DorkingGoogle DorksGoogle Hacking

    Posts navigation

    1 2

    Latest Articles

    • netcal-for-bind-and-reverse-shell
      April 18, 2022December 25, 2022A. Boukar

      Create Bind and Reverse Shells using Netcat

    • SSRF Explained
      April 8, 2022April 8, 2022A. Boukar

      Server-Side Request Forgery (SSRF) Explained

    • Host Header Injection Attack
      February 5, 2022December 25, 2022A. Boukar

      Host Header Injection Attacks

    • http request smuggling attack
      December 31, 2021December 25, 2022A. Boukar

      HTTP Request Smuggling Explained

    • XXE
      December 12, 2021December 25, 2022A. Boukar

      XXE Attacks Explained

    Newsletter

    Recent Posts

    • Create Bind and Reverse Shells using Netcat
    • Server-Side Request Forgery (SSRF) Explained
    • Chapter 12 – Bash Scripting
    • Host Header Injection Attacks
    • HTTP Request Smuggling Explained
    Copyright All rights reserved - Patchthenet.com
    • Medium