Malware
-
Bypassing AV – Avast, on a Windows 7
Bypassing Avast Antivirus: A Hands-On Guide In today’s cybersecurity landscape, bypassing antivirus (AV) software is a critical skill for penetration testers and malicious actors alike. In this lab, we’ll explore how to bypass…
-
Leveraging PowerShell During Exploitation – Empire
Using Empire is another powerful approach for attackers looking to leverage PowerShell for exploitation and maintaining control over compromised systems. Empire is a post-exploitation framework that facilitates various attack vectors and includes modules…
-
Leveraging PowerShell During Exploitation
Leveraging PowerShell during exploitation is a common technique used by attackers due to its powerful capabilities and its presence on most Windows systems. Here are several methods and techniques for using PowerShell during…
-
Understanding Same Origin Policy (SOP) and Cookies: A Practical Lab Guide
In today’s interconnected web landscape, security measures like Same Origin Policy (SOP) and cookie management play pivotal roles in safeguarding user data and ensuring secure interactions between web applications. This lab guide provides…
-
Web Application Attacks
Here are some common web application attacks, each explained with examples: 1. SQL Injection Description: Attacker inserts or manipulates SQL queries to execute arbitrary commands on the database. Example:Input: ' OR '1'='1Query: SELECT…
-
WEB APPLICATION PENTESTING CHECKLIST
Broken Access Control Cryptographic Failures Injection Insecure Design Security Misconfiguration Vulnerable and Outdated Components Identification and Authentication Failures Software and Data Integrity Failures Security Logging and Monitoring Failures :** Ensure that security-relevant events,…