Hello, a few days ago a reader asked me to upload the write-up of Brainpan (Vulnhub)
A machine that can be used for the preparation of the OSCP BoF, this time we will use Mona.
Continue reading
Power belongs to the people who take it
Hello, a few days ago a reader asked me to upload the write-up of Brainpan (Vulnhub)
A machine that can be used for the preparation of the OSCP BoF, this time we will use Mona.
Continue reading
A few days ago a vulnerability was discovered in WordPress 5.1 that has already been patched in version 5.1.1, in this post we will explain it and exploit it step by step.
The vulnerability starts in a CSRF so it requires user interaction and javascript enabled in the victim’s browser.
Any doubt or correction will be appreciated.
Continue reading
In many hotels, institutes and companies, a captive portal is established to control access to the WIFI network. In this post we will see two real cases in which we could bypass this login, one with a very low protection and another that required more work but once prepared everything allows us to skip the restriction in many of the portals with that same configuration .
Hi, today I bring you the “proof of concept” of a vulnerability that was found a few days ago in WinRar. This vulnerability has been running for 19 years and has been patched in version 5.70 beta 1, so if you are a WinRar user it is very important that you update the software.
Sometimes trying to access or exploit a service from a host that we already have access to, we find that this service is only accessible internally or it is protected by a firewall. So what if we want for example to be able to use tools from our box, then we can use the technique of port forwarding. In this post I will show different methods that can be used in Windows and Linux environments.
If you know more methods or want to make some correction do not hesitate to comment.
Continue reading
© 2024 ironHackers
Theme by Anders Noren — Up ↑