Active Directory Penetration Dojo- Setup of AD Penetration Lab : Part 2

The Prologue Hi everyone, Welcome to the second part of the setup series on Pentest lab in AD environment. I hope your basic concepts about AD and Domain Controller are … Continue reading “Active Directory Penetration Dojo- Setup of AD Penetration Lab : Part 2”

Linux Buffer Overflows x86 – Part 2 ( Overwriting and manipulating the RETURN address)

Hello Friends, this is the 2nd part of the Linux x86 Buffer Overflows. First of all I want to apologize for such a long delay after the First blog of … Continue reading “Linux Buffer Overflows x86 – Part 2 ( Overwriting and manipulating the RETURN address)”

Ground Zero: Part 3-2 – Reverse Engineering – Patching Binaries with Radare2 – ARM64

In this post, we will explore a wonderful and powerful reverse engineering tool – Radare2, and see how we can patch binaries that we crack. In a previous post by … Continue reading “Ground Zero: Part 3-2 – Reverse Engineering – Patching Binaries with Radare2 – ARM64”