This Extensive Adobe Design Training Is on Sale for Just $50

Null Byte « WonderHowTo-- If you want to be truly competitive and successful in the world of web and app development, it's not enough to simply know a handful of programming languages and coding platforms. Today's best sites and apps require pro-level graphics and user interfaces, and knowing how to work with a wide range … Continue reading This Extensive Adobe Design Training Is on Sale for Just $50

Remote — HackTheBox Writeup OSCP Style

InfoSec Write-ups - Medium-- Remote — HackTheBox Writeup OSCP StyleRemote was an easy difficulty windows machine that featured Umbraco RCE and the famous Teamviewer’s CVE-2019–18988. Been thinking to publish an article in OSCP style, it took a while.Offsec’s PWK Example Report: https://www.offensive-security.com/pwk-online/PWK-Example-Report-v1.pdfI used the above example report for my OSCP exam report and this walkthrough will follow the same … Continue reading Remote — HackTheBox Writeup OSCP Style

TryHackMe. Exploiting EternalBlue Vulnerability.

InfoSec Write-ups - Medium-- Walkthrough on the TryHackMe EternalBlue machine.ReconBefore tackling any machine , there is a couple of Nmap scans that I like to use:All the switches in the first scan can be simply replaced by the -A switch, but sometimes it’s good to remind oneself what that switch does.The second runs all the scans included in … Continue reading TryHackMe. Exploiting EternalBlue Vulnerability.

Source Code Analysis and API Keys Exploitations

InfoSec Write-ups - Medium-- Source Code Analysis and Exploiting API KeysI was getting lots of requests and msg on Whatsapp, LinkedIn, Twitter about the source code analysis, and exploitation of API Keys. So I will share my approach and also some blogs and writeups which you can refer to get a clear understanding.Google ImagesSo whenever we … Continue reading Source Code Analysis and API Keys Exploitations

How to spot and exploit postMessage vulnerablities?

InfoSec Write-ups - Medium-- Hey fam, i hope everyone is doing okay and able to use this time efficiently for self development and to self reflect. This corona virus pandemic has grown a bit tiring to be honest and gets the best of us.Here is my attempt at helping you understand a bug often overlooked when … Continue reading How to spot and exploit postMessage vulnerablities?