ARP Cache Poisoning
ARP Cache Poisoning Objective The goal of this lab is to use packet spoofing to launch an ARP cache poisoning attack so that when two victim machines (A and B) communicate, their traffic is redir...
ARP Cache Poisoning Objective The goal of this lab is to use packet spoofing to launch an ARP cache poisoning attack so that when two victim machines (A and B) communicate, their traffic is redir...
Packet Sniffing & Spoofing with Scapy A Hands-On Networking Lab (Controlled Environment) In this lab, I explored how network packets can be captured, inspected, and crafted using Scapy in a co...
UDP Sockets with Python – Simple Send & Receive Examples This guide shows basic UDP client and UDP server implementations in Python, plus how to quickly test both directions using netcat (nc)....
🤖 Web LLM Attacks: Exploiting Large Language Model APIs This report documents several successful exploits against a web application utilizing a Large Language Model (LLM) with access to various ba...
Basics of SQL Introduction to SLQ Logging onto the mysql and then checking the database we have root@9c6e27fbb603:/# mysql -u root -p Enter password: Welcome to the MySQL monitor. Commands end ...
Cross-Site Scripting Attack (XSS) This report explores web security vulnerabilities by demonstrating three types of Cross-Site Scripting (XSS) attacks on a website popular around 2005. The attacks...
Tcpdump Packet Filtering Tcpdump provides a robust and efficient way to parse the data included in our captures via packet filters. This section will examine those filters and get a glimpse at how ...
Summary Introduction: In this memory analysis report, we delve into the identification and investigation of a suspicious process detected within the system’s memory. By leveraging the Volatility f...
What is the SHA1 hash of Triage-Memory.mem (memory dump)? c95e8cc8c946f95a109ea8e47a6800de10a27abd What volatility profile is the most appropriate for this machine? (ex: Win10x86_14393) using vol...
Challenge Details: It is common for threat actors to utilize living off the land (LOTL) techniques, such as the execution of PowerShell to further their attacks and transition from macro code. This...