Posts

OSCP Buffer Overflow Practice

Image
What is Buffer Overflow?     A buffer overflow occurs when data written to a buffer also corrupts data values in memory addresses adjacent to the destination buffer due to insufficient bounds checking. This can occur when copying data from one buffer to another without first checking that the data fits within the destination buffer.  I am learning buffer overflow and I just screen record my buffer overflow practice and shared with you. It might help you as well.  Try Harder!!!   Part 1       Part 2

OSCP Preparation... Try Harder!!!

Image
Hello All, It's long time I didn't posted on blogger due some busy job schedule + OSCP preparation. I will not write long article about it. I just wanted to share some useful resources and walkthrough links for OSCP like Virtual Machine on Vulnhub and Hack The Box. Try harder!!! Hack The Box OSCP-like Windows VMs S.No Windows Boxes: Walkthrough Links 1 legacy https://www.pathtoroot.net/l/hackthebox-legacy-writeup/   2 Blue https://medium.com/@ranakhalil101/hack-the-box-blue-writeup-w-o-metasploit-572c6042feb8   3 Devel https://medium.com/vulnerables/hackthebox-devel-ecf86cf7822f   4 Optimum https://medium.com/@nmappn/htb-optimum-writeup-9680466f01f7   5 Bastard https://medium.com/@ranakhalil101/hack-the-box-bastard-writeup-w-o-metasploit-78cceac4b9f4   6 granny https://www.pathtoroot.net/l/hackthebox-granny-writeup/   7 Arctic https://www.absolomb.com/2017-1

ZoomEye IoT Search Engine

Image
IoT Search Engines There are many known search engines for IoT such as Shodan , IoT Crawler , Thingful and Censys etc. but I will share some interesting features of a very powerful Chinese IoT search engine ZoomEye .  What is ZoomEye ZoomEye is a Cyberspace Search Engine recording information of devices, websites, services and components etc. ZoomEye has two powerful detection engines Xmap and Wmap aiming at devices and websites in the cyberspace. It can be used to identify all the services and components through 24/7 continuous detection. Therefore it is easier for researchers to understand the component coverage and the damage scope of vulnerabilities. Although being regarded as a "hacker-friendly" search engine, ZoomEye is not designed to initiate attacks towards network devices or websites. The recorded data is for security research use only. It is more like a navigational chart in the cyberspace. What ZoomEye Show You can search Zoo

Find Your Lost Phone with Google

Image
I would like to share a very nice feature of Google today. Many people might be unaware of it. "Google Find My Device" lets you remotely track, lock, and erase the data on a lost or stolen phone without installing any additional app. You can also see the battery life remaining on your phone and the Wi-Fi network it is connected to. It's the easiest way to track a lost Android phone. Follow the steps to locate your Mobile device. Login to your Google account which you have used to activate on your phone. 1. Click on Google apps icon. 2. then select Account     After selecting the account click on the Security tab in left panel. Scroll down to Your Devices section and click on "Find a lost or stolen phone" button. Select your device in case you have register more than one phone on your email address. Verify your account by entering the password of your email address. Click on Locate icon. You will see the "G

Intercepting Signalling System No. 7 (SS7) - Practical Lab

Image
Introduction  This is my first blog on blogger.com. I want it to be very interesting for people who are interested in information security field and also want learn new things. I will try to share good reads and intersting articles on my blogs. Lets begin with my favorite one here. Please note that english is not my native language I will apologize for my bad english in advance 😀. It was an awesome experience while playing around Immersive labs machines during the past month, there are much to learn from hands-on practical labs. But one lab I liked the most was Signalling System No. 7 (SS7) interception practical lab, which is used to exchange data between devices in telecommunication networks. We will use it to gain access to a fictional user’s bank account and successfully transfer funds. There are many good tutorials and online resources available for SS7, therefore I will keep it short here.   Introduction to SS7 Interception There have been a number of attacks r