19-Powershell Payload Delivery via DNS using Invoke-PowerCloud: 17-Privilege Escalation on Linux with Live examples: 16-Reverse Engineering of the Anubis Malware - Part 1: 15-Penetration Testing of an FTP Server: 13-Shellcode: A reverse shell for Linux in C with support for TLS/SSL: 10-Reconnaissance: a eulogy in three acts: 8-BugBounty - “How I was able to shop for free!”- Payment Price Manipulation: 7-BugBounty - “I don’t need your current password to login into your account” - How could I completely takeover any user’s account in an online classi ed ads company: 6-“Journey from LFI to RCE!!!”-How I was able to get the same in one of the India’s popular property buy/sell company: 5-BugBounty - “Let me reset your password and login into your account “-How I was able to Compromise any User Account via Reset Password Functionality: 4-BugBounty Linkedln-How I was able to bypass Open Redirection Protection:
3- 3 Ways to Crack Wifi using Pyrit,oclHashcat and Cowpatty:
2- 3 ways to Capture HTTP Password in Network PC: 1- 3 Ways Extract Password Hashes from NTDS.dit: PENTESTING-BIBLE Explore more than 2000 hacking articles saved over time as PDF.