Reconnaissance / Enumeration Extracting Live IPs from Nmap Scan nmap 10.1.1.1 --open -oG scan-results; cat scan-results | grep "/open" | cut -d " " -f 2 > exposed-services-ips Simple Port Kn...
Malware Analysis of Xworm
Xworm Xworm represents a form of malware, targeting Windows systems. Upon infection, it can compromise the security of the system, potentially leading to data theft or unauthorized remote access....
Overly Permisive IAM resources
What are IAM Resources? The user, group, role, policy, and identity provider objects that are stored in IAM. As with other AWS services, you can add, edit, and remove resources from IAM. Done.
Stack-Based Buffer Overflow Linux x86
This is a walkthrough of the HTB Academy Module for Stack-Based Buffer Overflow on Linux x86. Buffer Overflow Introduction: Buffer overflows are among the most common security vulnerabiliti...
AWS IAM Exploitation
What is IAM? In AWS Identity and Access Management (IAM) is a web service that helps you securely control access to AWS resources. You use IAM to control who is authenticated (signed in) and auth...
- 1
- 1 / 1