Posts related to our team research on various offensive security works available from multitude of resources.

Vegile (Unlimited Shell In Linux Using Metasploit)

VEGILE (UNLIMITED SHELL IN LINUX USING METASPOILT) This blog post was written by Alex Maina. Introduction This blog will talk about maintaining persistence in Linux using Vegile. Vegile (Ghost in the Shell) is a tool for post-exploitation. Post exploitation technique will ensure that we maintain some level of access [...]

By |2021-01-21T10:55:32+03:00December 13th, 2020|Offensive Security, Penetration Testing, Red Teaming|

Data Execution Policy (DEP) Bypass Using Return Oriented Programming (ROP) Chains

DATA EXECUTION POLICY BYPASS USING RETURN ORIENTED PROGRAMMING CHAINS This blog post was written by Dharmik Karania. Data Execution Prevention (DEP) was introduced as a security mechanism in Windows Machines to make parts of memory non-executable, due to which attacks that attempt to execute instructions on the stack [...]

By |2021-05-03T15:45:09+03:00November 10th, 2020|Offensive Security, Penetration Testing, Red Teaming|

Attacking WPA/WPA2 Wi-Fi and spreading a payload on the compromised network

ATTACKING WPA/WPA2 Wi-Fi & SPREADING A PAYLOAD ON THE COMPROMISED NETWORK This blog post was written by Alex Maina. Intro Before attacking wifi networks we need to understand how they work. What is Wi-Fi? WiFi stands for Wireless Fidelity and is the same thing as saying WLAN which [...]

By |2021-01-21T11:16:00+03:00November 3rd, 2020|Offensive Security, Penetration Testing, Red Teaming|

Creating a Fully Undetectable (FUD) Backdoor

CREATING A FULLY UNDETECTABLE (FUD) BACKDOOR This blog post was written by Varun Gupta and Amarjit Labhuram. At the beginning of September one of our cohort members, Varun Gupta, asked a very interesting question: How can I create a metasploit payload that can bypass Windows Defender on a [...]

By |2021-05-24T15:58:22+03:00September 20th, 2020|Offensive Security, Penetration Testing, Red Teaming|

Install Kali NetHunter on unrooted Android device

INSTALLING KALI NETHUNTER ON UNROOTED ANDROID DEVICE This blog post was written by Amarjit Labhuram. I had been putting off getting NetHunter on my phone for some weeks and when I was reading through the new release of Kali 2020.1 I came across an interesting update on [...]

By |2021-01-21T11:47:53+03:00January 30th, 2020|Offensive Security|

Hack The Box – Haystack

A WRITE-UP FOR THE MACHINE HAYSTACK GETTING USER First thing we do is a nmap scan against the target [10.10.10.115] $ nmap -sC -sV -oA haystack 10.10.10.115 PORT STATE SERVICE VERSION | ssh-hostkey: | 2048 2a:8d:e2:92:8b:14:b6:3f:e4:2f:3a:47:43:23:8b:2b (RSA) | 256 e7:5a:3a:97:8e:8e:72:87:69:a3:0d:d1:00:bc:1f:09 (ECDSA) |_ 256 01:d2:59:b2:66:0a:97:49:20:5f:1c:84:eb:81:ed:95 [...]

By |2020-01-30T00:06:59+03:00November 4th, 2019|Hack The Box, Penetration Testing|
Go to Top