New: offensive-securityAll contenthive-129948krhive-196917zzanhive-183959hive-180932hive-185836hive-166405hive-150122steemhive-101145hive-144064uncommonlabhive-145157hive-188619hive-183397hive-184714bitcoinlifekrsuccesshive-193637motivationhive-180301hive-103599hive-193186TrendingNewHotLikerscristi (70)in cybersecurity • 7 years agoWalkthrough for DerpNStink - A Vulnerable Machine from Vulnhub - [Part 2]In the previous demonstration, the first part of this walkthrough for DerpNStink vulnerable machine, we've managed to get inside the server by exploiting different services. Now, in this part, our…cristi (70)in cybersecurity • 7 years agoPractical Malware Analysis - Lecture 5 - [Prof. Sam Bowne]Ok, so if you've been following my stuff, you know that I'm into Professor Sam Bowne's course from the Community College of San Francisco. So far, we've been going through some basics in this…cristi (70)in cybersecurity • 7 years agoWalkthrough for Shocker - A Vulnerable Machine [HackTheBox]In this video I demonstrate how I get into and own a vulnerable virtual machine from hackthebox.eu. This box, as its name might suggest, is vulnerable to a shellshock exploit. For those who don't…cristi (70)in cybersecurity • 7 years agoPentesting Environment under Windows - [PentestBox]Alexis Ahmed from Hackersploit youtube channel just made a insightful review on PentestBox, that was just recently released. So, the premise behind PentestBox is that it comes as a very good…cristi (70)in cybersecurity • 7 years agoBeginning Exploit Development - [Prof. Sam Bowne]Here's another one from my favorite professor in information security. So, in this hour long workshop, Professor Sam Bowne at CCSF, teaches folks at Toro.hack the basic of developing exploits -…cristi (70)in cybersecurity • 7 years agoWalkthrough for DerpNStink - A Vulnerable Machine from Vulnhub - [Part 1]In this video I demonstrate a penetration testing assessment on a vulnerable machine from vulnhub.com. This machine is called DerpNStink and I enjoyed working on it a lot. In the first part of…cristi (70)in cybersecurity • 7 years agoWalkthrough for LAME - A Vulnerable Machine [HackTheBox]In this video walkthrough I'm going to demonstrate another vulnerable machine from hackthebox.eu. For those of you who don't know, HackTheBox is a platform where cyber-security professionals can…cristi (70)in cybersecurity • 7 years agoJIS-CTF Walkthrough - Yet Another Cybersecurity VideoIn this video I demonstrate how to get into a webserver through an unsanitized file upload functionality. First, we're dealing with a server for which the access to the administrator panel is…cristi (70)in cybersecurity • 7 years agoPrivilege Escalation on Hackademic_RTB1 - A CTF WalkthroughThis is the second part for the walkthrough of the vulnerable machine HTB from vulnhub. In the first video I showed that to get inside this machine we exploited an SQL injection vulnerability. We…cristi (70)in programming • 7 years agoDisassembling Binaries with IDA - [A Reverse Engineering Tutorial]In my penetration testing training, I'm currently working on a vulnerable machine that doesn't seem to have too many ways in. There are only 2 open ports, both for web services. I was able to…cristi (70)in offensive-security • 7 years agoA Collection of Vulnerable Machines for Penetration Testing and Offensive Security - [Vulnhub]If you're into offensive security, one of the best places to safely practice your craft is Vulnhub , which is a collection of virtual machines which are vulnerable by design. What do I mean by…