Alternate Logins

When we browse a web site, the first thing we often notice is its login pages. The more amateur hacker may try to brute-force it right away. However, the more experienced tester will think: are there any other authentication points to the same resource? The answer is often resoundingly YES! Modern applications often create alternative

What are Serialization / Deserialization attacks about?

So what is de-serialization? What are serialization attacks? What is serialization? What is serial? Ok ok, hold your horses, kemosabe…will start from the beginning, this is serial: Now that the hard part is out of our way, lets start dissecting the rest. Common explanation: Serialization is merely representing object as a stream of bits and

Problems Uploading Web-Shells

Lets say you found a security issue that allowed you to upload a PHP web shell into the application. We all have been through those simple php web shells: Classic! Or it can be hundreds of lines of more complex code. You then happily gallop to your shell to execute commands: And then something

Port Scanning Tips…nmap

Often penetration testing engagements start with good old –*port scanning*–. Nmap is often the tool to use for it: nmap -p- [ip-address-here] –open -T3 -T argument is a parameter of time, and it is an important one. Here is the table illustrating different timing modes: Two important details from the table above: When this can

What is .git and how you eat it?

Git is an open-source distributed version control system that is available to all kinds of users for free. Git tools work in conjugation with Git repositories. OK, now in human language…when you see a .git directory in a web app – it is good. It means the web app developer by mistake (or not?) deployed

SQL Injection through covert DNS channel

In one of the engagements I was assigned an interesting case. The web application was obviously vulnerable to SQL injection, but WAF (web-application firewalls) were blocking any data exfiltration attempts. So the question arose how to get data? But we will start from the beginning. One of the POST search parameters appeared to be vulnerable

Reverse Shell through Pings

During a penetration test, there may be a scenario where we would like to gain a shell on the system we can execute commands on, however we may not be able to do so because both outbound and inbound ports are blocked. However, we may still gain Reverse Shell connection without using ports at all.

My eJPT Exam Review

Hi everyone! I successfully passed eJPT exam a few days ago and would like to share my experience with you. Does eJPT worth it? INE program for preparing for the exam is free, certificate costs only 200$ and includes 2 tries, therefore it’s definitely a good opportunity for a novice to start your hacking journey