Recent Posts

File Transfer - Post Exploitation

2 minute read

File transfer is an essential step after we have successfully exploited our target. To transfer files from our target machine to our own system or to upload ...

Penetration Testing Methodology

15 minute read

In this post I am going to share some penetration testing process which I use when conducting a general pentest or tackling Boot2Root machines. Introduction ...

Getting Root via /etc/passwd file

1 minute read

The /etc/passwd file is a file we should check whenever we gain access into a system. A simple misconfiguration with the file permission can enable us to ...

Upgrading your reverse shell

1 minute read

After we have gotten our reverse shell, it will have limitations such as no auto-completions and messy file listings. Here is how we can make our shell be...