What Are INodes In Linux?!Learn about inodes in Linux: what they are, how to see inodes, and why they're important for exploitation and penetration testing.Feb 26101Feb 26101
The Art of Managing Linux ProcessesLearn about Linux processes: how they work, their types, creating processes, manipulating processes, and much more.Feb 256Feb 256
The Linux File PermissionsLearn about the format and structure of Linux file permissions, permission classes, symbolic and binary permissions, as well as the concept…Feb 25571Feb 25571
The Linux File SystemExplore Linux file systems, including EXT4, data blocks, super blocks, groups, bitmaps, inodes, and more…Feb 2581Feb 2581
Windows Management for Penetration Testing Professionals🖥️Learn how to manage Windows, add or remove users from CMD, and change passwords without the current password. Also, learn about system…Feb 2320Feb 2320
Published inSystem WeaknessWindows Standard I/O/E In Nutshell✅Understand Windows Standard Input/Output/Error and its significance in penetration testing engagements.Feb 238Feb 238
PE Files & DLLs In WindowsDiscover what PE files and DLLs are in Windows, how they function, their structure, and the significance of DOS, along with much more…Feb 23Feb 23
Published inSystem WeaknessWindows Named Pipes In NutshellLearn about Windows Pipes, including Named Pipes and Anonymous Pipes, as well as how attackers exploit these pipes for attacks.Feb 19282Feb 19282
Published inOSINT TeamWhat Is Windows Internal Tokens🎫Learn about Windows tokens, how they work, the types of tokens, and their usefulness to hackers.Feb 19821Feb 19821
Published inSystem WeaknessWindows SID’s In Nutshell📰Learn about what a SID is in Windows, how they look, how to find SIDs, the concepts of RID and Universal SIDs, and their uses in…Feb 18401Feb 18401
Published inSystem WeaknessWindows API Calls In NutshellUnderstand Windows API calls, how the API library functions, and how these APIs interact with the Windows GUI.Feb 181Feb 181
Published inInfoSec Write-upsWindows Internals — Alternate Data Streams🌊Learn what Data Streams are and how we can exploit them in pentesting or red team engagements. Additionally, explore how we can deliver…Feb 17Feb 17
Published inOSINT TeamThe Art Of Windows Permission’s 🔑Understand Windows permissions, how they work, and their importance for Windows security. Learn about user and group permissions to enhance…Feb 17Feb 17
Published inInfoSec Write-upsWhat is Windows User Account Control for beginners?👨💻Learn about Windows Internals — what UAC is, how it works, and how to manipulate it to our advantageFeb 171Feb 171
Published inOSINT TeamThe Windows Logs👨💻Learn about Windows logs, including how to view, filter, and manipulate event IDs. This knowledge will assist you in Windows analysis and…Feb 16Feb 16
Published inSystem WeaknessThe Windows File System For Penetration Testing 🗃️Learn about Windows file systems, specifically NTFS, formatting, file tables, and MFT records, and understand their usefulness to…Feb 161Feb 161
Published inSystem WeaknessThe CIA Triangle In Nutshell🔼Understand confidentiality, integrity, and availability and their importance for red teamers and penetration testers and why companies need…Feb 161Feb 161
Published inSystem Weakness💫Penetration Testing Specialties?!Discover the specialties in penetration testing, why having them is important, and the types of specialties you can choose from!Feb 131Feb 131
Published inOSINT TeamHow Cybersecurity Teams Build Their Enterprise Budget💸💵Understand how Cyber Security Teams develop their budget and the importance of securing funding from executive staff, as well as managing…Feb 2Feb 2
Published inOSINT TeamPenetration Testing Routine Assessments Part 6 — Building an Assessment Plan🏗️Learn how to build an assessment plan for penetration testing or red teaming engagements. Understand how this works, why it’s important…Feb 2Feb 2