What’s that coming over the hill? Is it a MOBster, is it a MOBster!?

Estimated difficulty: πŸ’œπŸ’œπŸ’œπŸ’œπŸ€ Welcome back to the MOBster series! The last post I published, covered the different aspects of an APK file – otherwise known as an app. This post I want to take some of these principles a step further and look at the possible effects of a misconfigured Continue Reading

They See Me Scannin’, They Hatin’: A Beginner’s Guide to Nmap

Estimated Difficulty: πŸ’œπŸ’œπŸ’œπŸ€πŸ€ Recon, Recon, Recon One of the most important phases of an attack, is the reconnaissance phase. Often abbreviated to recon, this phase usually consists of a variety of process and techniques to collect information about a target system. This phase may also be known as “Information Gathering” Continue Reading

Bop to the Top: A Linux Priv Esc. Checklist

Estimated Difficulty: πŸ’œπŸ’œπŸ’œπŸ’œπŸ€ Congratulations, you’ve got a foothold!Now what? Bop to the Top and get yourself some Root! The following blog will detail my own personal checklist that I run through when attempting to privilege escalate in a Linux environment. From my personal experience, it has a fairly good success Continue Reading