Learn to exploit a vulnerable CMS(Content Management System) using Remote Code ExecutionContinue reading on InfoSec Write-ups » View original article on InfoSec Write-ups - Medium
Category: Articles
[ExpDev] Vulnserver — Part 7
[ExpDev] Vulnserver — Part 7Vulnserver — Part 7 (LTER — SEH Overwrite + Restricted Character Set)This will be the 7th vulnserver exploit series. We will be fuzzing and exploiting the vulnerable command LTER this time. We will identify a crash point with an SEH overwrite and circumvent the restricted character sets to introduce our encoded shellcode to gain shell access.Lab EnvironmentOS: Windows 7 (x86)Debugger: … Continue reading [ExpDev] Vulnserver — Part 7
TryHackMe: Overpass 2 — Hacked Walkthrough
TryHackMe: Overpass 2 — Hacked WalkthroughIn this article, I will be providing a walkthrough for the Overpass 2 — Hacked room, a free room available on the TryHackMe platform created by NinjaJc01. I have provided a link to the TryHackMe platform in the references below for anyone interested in trying out this free room.DisclaimerThis is a walkthrough room and not … Continue reading TryHackMe: Overpass 2 — Hacked Walkthrough
How I failed in GCB exam yet won a Brand new expensive Sony TV.
Yeah that’s a story to tell you know.. when you lose yet you win… story of life :PSO let’s get started.. to make it more interesting and to save you time based on your preference to read, I am segregating this blog into three sections, where one talks about the reasons I had not to take … Continue reading How I failed in GCB exam yet won a Brand new expensive Sony TV.
A week in security (August 17 – 23)
Last week on Malwarebytes Labs, we looked at the impact of COVID-19 on healthcare cybersecurity, dug into some pandemic stats in terms of how workforces coped with going remote, and served up a crash course on malware detection. Our most recent Lock and Code podcast explored the safety of parental monitoring apps. Other cybersecurity news … Continue reading A week in security (August 17 – 23)
Hexdump and Hexfiend in 3 minutes
Hiding and extracting data from any file! Continue reading on InfoSec Write-ups »


![[ExpDev] Vulnserver — Part 7](https://h4ck3r5code.files.wordpress.com/2020/08/89b6a-1rxpvfaohhsmotb48yjd11a.png?w=656&h=300&crop=1)

