How to Pass OSCP

How to Pass OSCP

I have not been able to publish in the last few weeks because I was preparing for OSCP. If you are thinking of obtaining this certification, here is my personal experience!

Infrastructure Hacking: SSH Protocol

Infrastructure Hacking: SSH Protocol

This is the second post in the new section of the website where I will explain in detail a specific protocol and show examples of different ways to exploit different vulnerable implementations. To make these posts I have used as an example implementations that can be found in the hackthebox.eu, as well as Ippsec videos. … Read more

Infraestructure hacking: FTP Protocol

Infraestructure hacking: FTP Protocol

This is the first post in the new section of the website where I will explain in detail a protocol in contrast and show examples of different ways to exploit different vulnerable implementations. To make these posts I have used as example implementations that can be found in the hackthebox.eu platform, as well as the … Read more

HackTheBox: news, VIP and VIP+ version

hackthebox

One of the first posts on this website was an introduction to the platform that has been with me since the beginning of my hacking career. It is HackTheBox, a pentesting platform where thousands of intrepid hackers race trying to take control of as many machines as possible. It’s been more than two years since … Read more

OSINT techniques and tools

OSINT

Searching for information in public sources and making intelligence with this information is something very useful for a hacker. Sometimes you don’t need to break into any system to get the information you need. You just need to know where to look.  Google Dorks Some time ago I published a post in which I explained … Read more

Shodan

Hacking

Shodan is a search engine to find specific services such as webcams, SCADA systems, linksys… Its operation is simple but effective: it scans the whole internet and uses the information returned by the device banners to discover the software version, the device model, etc. Shodan is especially useful for the investigation of IoT devices, since … Read more

SQL Injection: OAST techniques

Hacking

Today I bring you a very interesting type of SQL Injection, and that is not very well known. It’s a variation of Blind SQL Injection.if you’re still not very familiar with SQL injections, I recommend you visit this post first. You should also take a look at noSQL injections from non-relational databases.  In Blind SQL … Read more