This article contains an overview of shellcode development techniques and their specific aspects. Understanding these concepts allows you to write your own shellcode. Furthermore, you
Category: Pentest techniques
Pivoting to internal network via non-interactive shell
During a recent penetration test we have experienced the situation where we’ve gained remote code execution with limited privileges to a web server and had
NetRipper – Smart traffic sniffing for penetration testers
Ionut Popescu, Senior Security Consultant @ KPMG Romania has been accepted as speaker at the prestigious DEFCON conference. He will present one of his projects: NetRipper
Mobile penetration testing on Android using Drozer
Mobile phones have become an indispensable part of our daily life. We use mobile phones to communicate with our loved ones, for quick access to
Scripting Metasploit for a Real-Life Pentest
During a recent internal penetration test, we got to the point where we had to search a lot of Windows machines for Domain Admin tokens.
Upgrade your DLL to Reflective DLL
If you want to execute code stealthily on a machine and the antivirus stands in your way, you should think about avoiding the disk because