Network Sniffing

"To understand what is going on a networked computer, the only true way to...

Privilege Escalation Part I

By escalating the privileges inside a system the attackers gain access to resources which...

Burp Suite Intruder

As mentioned briefly in the vulnerability mapping section, burp suite is a powerful tool...

Vulnerability Mapping And Exploitation

Nessus
there are various vulnerability scanners that can be used to map vulnerabilities. I...

Exploiting Web Applications

Exploiting web applications can be a lot of fun as well. Here are some...