Vulndev

  • Home
  • Blog
  • Tools
    • Shellcode Converter
  • Misc
    • Exploits
    • Machine List
    • Cheats – Windows
    • Cheats – Linux
    • Cheats – Shells
    • Cheats – Cracking
  • Discord
  • Vulnlab
  • About Me
  • Home
  • Blog
  • Tools
    • Shellcode Converter
  • Misc
    • Exploits
    • Machine List
    • Cheats – Windows
    • Cheats – Linux
    • Cheats – Shells
    • Cheats – Cracking
  • Discord
  • Vulnlab
  • About Me

Home

xct2021-09-10T07:02:29+00:00
09JulJuly 9, 2023

Tool Review: WinSSH

xct2023-07-09T11:11:18+00:00

This video is a short overview on what you can do with WinSSH and how to use it. It essentially acts like a reverse shell with (dynamic-) port forwarding & file up- and download features that is only using trusted windows binaries.

By xctTools, Vulnlabc2, initial access, lateral movement, pivoting, windows
Read more...
01JulJuly 1, 2023

VL Intercept – Walkthrough

xct2023-07-18T09:24:00+00:00

Intercept is a chain of vulnerable machines on Vulnlab and involves stealing hashes with lnk files, a RBCD-Workstation takeover, exploiting GenericALL on OUs & finally attacking ADCS using ESC7.

By xctVulnlabactive directory, adcs, relaying, windows
Read more...
05MayMay 5, 2023

Shinra & Wutai Videos

xct2023-05-05T14:54:13+00:00

I'm linking the playlists for both labs here to avoid single posts for every video. Check out https://vulnlab.com if you want to try them out!

By xctVulnlabvulnlab
Read more...
28JanJanuary 28, 2023

VL Shinra Part 4 – Reverse Engineering, Binary Exploitation & Ansible

xct2023-01-28T09:25:14+00:00

This is part four of the Shinra series. We will get to access to a linux server via ssh, exploit a small authenticator app & use ansible to move to the next box.

By xctVulnlabansible, binary exploitation, linux
Read more...
18JanJanuary 18, 2023

VL Shinra Part 3 – Initial Payload Design, Host Enumeration & getting SYSTEM

xct2023-01-18T17:06:46+00:00

This is the third video of the Shinra series. We will get a shell on Ashleighs machine & escalate privileges.

By xctVulnlabactive directory, c2, evasion, phishing, runas, windows
Read more...
10JanJanuary 10, 2023

VL Shinra Part 2 – Enumerate, Enumerate, Enumerate!

xct2023-01-18T17:07:53+00:00

This is the second video of the Shinra series. Before setting foot onto any of the network's internal machines, we are going to spend a bit of time enumerating various things from our machine

By xctVulnlabactive directory, linux, windows
Read more...
12…23Next  
Support me on Patreon!

Categories

  • Browser Exploitation (1)
  • CTF (110)
  • Fuzzing (4)
  • Misc (2)
  • Tools (2)
  • Vulnerability (2)
  • Vulnlab (11)
  • Windows Kernel Exploitation (5)
  • Windows Userland Exploitation (3)

Latest Posts

Tool Review: WinSSH
July 9, 2023
VL Intercept – Walkthrough
July 1, 2023
Shinra & Wutai Videos
May 5, 2023
VL Shinra Part 4 – Reverse Engineering, Binary Exploitation & Ansible
January 28, 2023
VL Shinra Part 3 – Initial Payload Design, Host Enumeration & getting SYSTEM
January 18, 2023
VL Shinra Part 2 – Enumerate, Enumerate, Enumerate!
January 10, 2023

Tags

active directory aslr asrep-roasting binary exploitation command injection crypto custom exploitation cve dep deserialization docker dynamorio ftp gpo gs hackthebox keepass kernel exploit ldap lfi linux metasploit openbsd password cracking password spraying path hijacking pg practice phishing php port forwarding responder reversing rop seh buffer overflow seimpersonate service sql injection stack overflow sudo tryhackme tunneling vulnlab web windows xss

Contact

  • Email: xct@vulndev.io

Follow

Twitter Youtube Linkedin
© Copyright 2022. All Rights Reserved.