Gitjacker – Leak Git Repositories From Misconfigured Websites

KitPloit - PenTest Tools!-- Gitjacker downloads git repositories and extracts their contents from sites where the .git directory has been mistakenly uploaded. It will still manage to recover a significant portion of a repository even where directory listings are disabled.For educational/penetration testing use only. Installation curl -s "https://raw.githubusercontent.com/liamg/gitjacker/master/scripts/install.sh" | bash ...or grab a precompiled binary. … Continue reading Gitjacker – Leak Git Repositories From Misconfigured Websites

TryHackMe- Bounty Hacker CTF Writeup (Detailed)

InfoSec Write-ups - Medium-- CTF Writeup #2Welcome folks!!We are going to do Bounty Hacker CTF on TryHackMe.TryHackMe | Bounty HackerI always start off my CTF by creating a directory of CTF on Desktop and Nmap directory within the CTF directory.Let’s dive in!! Enjoy the flow!!Task 1. Living up to the title.Tasks List#1.1 Deploy the machineAns: No answer neededNmap Scan:We … Continue reading TryHackMe- Bounty Hacker CTF Writeup (Detailed)

A tale of VoIP Security Testing

InfoSec Write-ups - Medium-- Most of the Corporates do not focus on their internal security. They think that they are secure because their internal assets are accessible by internally. But Red Team Members know very well that How can attacker exploit internal infrastructures.Voice over Internet Protocol (VoIP) has seen rapid implementation over the past few … Continue reading A tale of VoIP Security Testing

Server-Side Request Forgery — SSRF: Exploitation Technique

InfoSec Write-ups - Medium-- Server-Side Request Forgery — SSRF: Exploitation TechniqueServer-side request forgery, or SSRF, is a vulnerability that allows an attacker to use a vulnerable server to make HTTP requests on the attacker’s behalf. This is similar to CSRF as both the vulnerabilities perform HTTP requests without the victim acknowledging it.With SSRF: the victim would be … Continue reading Server-Side Request Forgery — SSRF: Exploitation Technique

Memory Analysis For Beginners With Volatility – Coreflood Trojan: Part 1

InfoSec Write-ups - Medium-- Memory Analysis For Beginners With Volatility Coreflood Trojan: Part 1Welcome to my series on memory analysis with Volatility. To start off the series I want to make sure we’re all sorted out with our knowledge of Windows internals. If you’re not sure you know about any of these subjects, you should go … Continue reading Memory Analysis For Beginners With Volatility – Coreflood Trojan: Part 1