j0moz4@LIITN:/web:$'s blog

h0me

c0nt3nt

ad/lab-(bleach.local)

w4ke-up-s4mura1

komm4nds-ch347-sheet

x$$-f0r3st

de4l3r

Men In The Middle Attack Basics

A man-in-the-middle (MITM) attack intercepts and manipulates communication between two parties. The attacker acts as a “middleman” and can alter or view the communication as it passes through, without the parties being aware of the interception. MITM attacks can be carried out using a variety of protocols, including: HTTP: MITM attacks can be carried out ..

Read more
loading..
csh, javascript, pentesting

Cl13nt SId3 H4cKing Introduction

In this article we will introduce some basic concepts to understand the hacking techniques used against browsers focused on their “Client-Side”. JavaScript is a programming language that is commonly used in web development. It is a client-side scripting language, which means that it is executed by the user’s web browser rather than on a server. JavaScript..

Read more

Tshark uses for pentest

TSHARK CHEET SHEEP USES FOR PENTESTERSThis post shows a series of examples of the “tshark” command using it for different purposes, the examples shown below are specific to see interesting information regarding a particular protocol. Intrusion detection Capture of credentials/hashes Capture of suspicious traffic etc… Before we start we need to know ..

Read more
12