Skip to content
  • Thursday 9th February 2023
    • Medium

    Patch The Net

    One node at a time

    • Linux
    • Web Application Security
    • Red Teaming
    • CISSP Prep

    Category: Red Teaming

    • Articles
    • Red Teaming

    Create Bind and Reverse Shells using Netcat

    Netcat (nc, ncat, or the swiss army knife of networking, as some might prefer to call it) is a command-line utility that every self-respecting pentester should carry under their belt. […]

    View the post
    A. BoukarApril 18, 2022December 25, 2022
    Tags: mkfifonetcatreverse shellshell
    • Articles
    • Red Teaming

    Linux Privilege Escalation: Three Easy Ways to Get a Root Shell

    Once you’ve gained access to a Linux system, the next logical step is to perform privilege escalation. That is, to go from a user account with limited privileges to a […]

    View the post
    A. BoukarJuly 30, 2021December 25, 2022
    Tags: LinuxPrivilege Escalationroot
    • Articles
    • Red Teaming

    Using John The Ripper To Crack Password Hashes

    Every self-respecting pentester should have a powerful password cracker in their toolkit, and John the Ripper is simply the best cracker out there. Initially released in 1996 by Openwall, John […]

    View the post
    A. BoukarJune 29, 2021December 25, 2022
    Tags: john crackerjohn the ripperpassword cracking
    • Articles
    • Red Teaming

    How To Use Nmap: A Beginner’s Guide

    Nmap is an open-source network mapping tool developed by Gordon Lyon. It is widely used as a port scanner and a host discovery tool by network administrators and hackers world-wide. […]

    View the post
    A. BoukarJanuary 19, 2021December 25, 2022
    Tags: how to use nmapnetwork hackingnmapport scanning
    • Articles
    • Red Teaming

    Overthewire, Learn Hacking By Playing Games

    If you’ve spent enough time on the web searching for practical resources to learn how to hack, then you should know by now what a hustle it is to find […]

    View the post
    A. BoukarJanuary 13, 2021December 25, 2022
    Tags: CTFsHackingoverthewirewargames
    • Articles
    • Red Teaming

    Google Dorks Explained

    Whenever you want to look for something on the Internet, you use Google. The giant search engine indexes almost everything on the web. It has made billions of web pages […]

    View the post
    A. BoukarJanuary 7, 2021December 25, 2022
    Tags: Google DorkingGoogle DorksGoogle Hacking

    Latest Articles

    • netcal-for-bind-and-reverse-shell
      April 18, 2022December 25, 2022A. Boukar

      Create Bind and Reverse Shells using Netcat

    • SSRF Explained
      April 8, 2022April 8, 2022A. Boukar

      Server-Side Request Forgery (SSRF) Explained

    • Host Header Injection Attack
      February 5, 2022December 25, 2022A. Boukar

      Host Header Injection Attacks

    • http request smuggling attack
      December 31, 2021December 25, 2022A. Boukar

      HTTP Request Smuggling Explained

    • XXE
      December 12, 2021December 25, 2022A. Boukar

      XXE Attacks Explained

    Newsletter

    Recent Posts

    • Create Bind and Reverse Shells using Netcat
    • Server-Side Request Forgery (SSRF) Explained
    • Chapter 12 – Bash Scripting
    • Host Header Injection Attacks
    • HTTP Request Smuggling Explained
    Copyright All rights reserved - Patchthenet.com
    • Medium