The HackMyVM Keys Walkthrough
The Ethicalhacking Guru
by guru
1y ago
This is the HackMyVM Keys Walkthrough. Web Enumeration The webserver is hiding interesting files, it took a few different lists from seclists to find something good. What we do find is a file readme.php and that means we can investigate further. gobuster dir -r -u http://10.0.50.79/ -w /usr/share/seclists/Discovery/Web-Content/directory-list-2.3-small.txt -x php The first page we run into says to READ the page, so I inspect the page source code and find some base64. The decode to see a hidden directory my_personal_wordlist.txt. We will end up decoding several things in this walkthrough. Put ..read more
Visit website
OSCP Prep: M87 Vulnhub Walkthrough
The Ethicalhacking Guru
by guru
1y ago
Preparing for the OSCP exam means you need to know the basics, but you also need the experience. There is perhaps no better way to test how prepared you are for the exam than by hacking web apps. In this walkthrough we will cover one important skill to master, SQL injection without Metasploit. The M87 Vulnhub walkthrough will teach you how to do this so that you can feel confident in taking the exam no matter what is on the test. Go to EHG Youtube What Is SQL Injection? SQL Injection is a code injection technique used by hackers to affect the database that is running behind the web application ..read more
Visit website
The Hacker Kid Vulnhub Walkthrough
The Ethicalhacking Guru
by guru
1y ago
This is the Hacker Kid Vulnhub walkthrough. Here’s what you will learn from this walkthrough. One thing you will learn is how to do binary analysis for Linux privilege escalation, but that is all I will give away. This is an excellent OSCP like box you can use to practice for the OSCP exam for free. What is an OSCP-like box? An OSCP-like box is one you might see on the Offensive Security OSCP exam. It is one that is more realistic in its intended exploitation than other boxes that rely on less practical exploit methodologies such as steganography, cracking complex hash sequences, etc. In a nut ..read more
Visit website
Setup Windows 10 Machine Automatically Using This Script
The Ethicalhacking Guru
by The Ethical Hacking Guru
1y ago
You are unauthorized to view this page ..read more
Visit website
BillU_bOx 2 Vulnhub Walkthrough
The Ethicalhacking Guru
by guru
1y ago
This is the Billi Box 2 Vulnhub walkthrough. Here’s what you will learn from this walkthrough. One thing you will learn is how to do binary analysis for Linux privilege escalation, but that is all I will give away. This is an excellent OSCP like box you can use to practice for the OSCP exam for free. What is an OSCP-like box? An OSCP-like box is one that is more realistic in its intended exploitation than other boxes that rely on less practical exploit methodologies such as steganography, cracking complex hash sequences, etc. In a nutshell, it means that the box is something you could expect t ..read more
Visit website
The HMS 1 Vulnhub Walkthrough
The Ethicalhacking Guru
by guru
1y ago
Exploiting vulnerable machines in a legal and safe environment is the only way to become an experienced ethical hacker. That is what this site is dedicated to, and so I present to you the HMS 1 vulnhub walkthrough, another of the vulnhub series here on the site. HMS 1 is a vulnerable Linux box created by Nivek. The HMS 1 vulnhub box is an excellent practice for Linux privilege escalation and a delightfully refreshing exercise in learning web app hacking. Here is an overview in what you can expect to learn from completing the HMS 1 vulnhub walkthrough: Manual SQL Injection and Exploitation Usi ..read more
Visit website
How to Become a Penetration Tester?
The Ethicalhacking Guru
by TEHG
1y ago
Penetration testing is one of the most emerging and promising fields in the IT sector. Penetration testers are ethical hackers. These “good” hackers are usually hired by system software owners or web-based application companies. The pen testers check the vulnerability of the private data of the system. So, ethical hackers are responsible for protecting data from the unethical hackers who may try to break into the system. Do you want to become a penetration tester? Keep reading to learn about all the things you need to know. What Does a Pen Tester do? The main job of a pen tester is to identify ..read more
Visit website
How To Write A Reserve Shell In Nim To Bypass Antivirus
The Ethicalhacking Guru
by TEHG
1y ago
In this tutorial, you will learn how to write a reverse shell in Nim to bypass antivirus detection. What Is Nim? Nim is a scripting language similar to Python in syntax, but close to Golang in that it requires statically typed variables and it compiles its programs. Why Use Nim? However you feel about Python or Golang for that matter, Nim is worth looking at for offensive programming. Very mature FFI (Foreign Functiong Interface) Smaller compiled binaries than Golang. (KB’s versus 200+ KB) Cross-compilation support with mingw-64, similar to Golang. Can call the Windows API directly via the FF ..read more
Visit website
Jumpstart A New CyberSecurity Career With The New TryHackMe.com Pre Security Course
The Ethicalhacking Guru
by guru
1y ago
Here at ethicalhackingguru.com the Ethical Hacking Guru is ready to spread the love. That is why this post is all about the new Pre Security Course from tryhackme.com which I have just finished. My review of this course will touch on the highlights as well as the disappointments. As our About page will attest to, the mission of this site is to provide professional-grade cybersecurity training at affordable prices for the curious self-starters who want to start a new career, but aren’t sure how to. Our students refuse to be a victim of the overpriced “bootcamps” that do nothing but frustrate an ..read more
Visit website
The VulnCMS Vulnhub Walthrough Without Metasploit
The Ethicalhacking Guru
by guru
1y ago
This is a walkthrough for the VulnCMS:1 vulnhub machine. If you are looking for OSCP-like vulnhub boxes to practice with then look no further. Really if you want to prepare for the OSCP then you should consider subscribing to the Ethical Hacking Guru Academy. Here’s What You Need Kali Linux VM VulnCMS:1 VM Setup To download drupwn: git clone https://github.com/immunIT/drupwn.git cd drupwn/ pip3 install -r requirements.txt To download droopescan: git clone https://github.com/droope/droopescan.git cd droopescan pip install -r requirements.txt ./droopescan scan –help Initial Enumeration Once yo ..read more
Visit website

Follow The Ethicalhacking Guru on Feedspot

Continue with Google
OR