Explore advanced techniques in post-exploitation and rootkit development as discussed by Micropoor. Learn about the importance of线索排查与反线索排查in maintaining persis
This article delves into the evolution of backdoors in advanced persistent threats (APTs), discussing their importance for both attackers and defenders. Learn a
Explore the evolution of backdoor techniques in season 8 of Advanced Persistent Penetration. This article delves into creating a remote control backend for note
This article details a penetration test conducted on a talent website, highlighting issues such as logical privilege escalation, XSS vulnerabilities, and SQL in
This article details the process of penetration testing on a certain German online game application, including login methods, backend access and password cracki
Explore essential skills and techniques for effective web penetration testing with this comprehensive set of interview questions. Ideal for professionals prepar
Explore GreatSCT, a white-listed payload execution framework based on Metasploit, designed for red team exercises. Discover its capabilities and applications in
Discover the Zabbix 3.0.21 vulnerability and learn how to exploit it with Python libraries and a custom Perl script for remote shell access in this HTB (Hack Th
This article details a penetration test on a phishing site used for stealing QQ accounts. Key findings include SQL injection vulnerabilities and the use of Goog