Author: jacobo

Penetration Testing Wiki

10 RULES TO BECOME A GREAT PENTESTER

#1 First step is to understand deeply how a computer, network works. So without this understanding you cannot understand what is happening behind the scenes. Get a good understanding of computer memory, network protocols, OS essentials,… #2 Kali linux is the standard the facto for pentesting, so you will have to master Linux commands. #3…
Read more

Pentestwiki.org joins the Brave Verified Creator program

BAT (Basic Attention Token) is a crypto token natively supported by the Brave webbrowser that blocks standard trackers and cookies and shows you a limited number of ads in a pop-up window. For each ad you can earn around 0.005 BAT and also you can send BAT to websites that are part of the BAT…
Read more

Top 10 smart contract vulnerabilities on Ethereum

NCC group started an initiative called DASP for Decentralized Application Security Project in 2018. It covers the top 10 vulnerabilities found in smart contracts running on the Ethereum blockchain. This is a quick summary of the top 10: Reentrancy: Occurs when external contract calls are allowed to make new calls to the calling contract before…
Read more

Certified Blockchain Security Professional certification

After studying blockchain for a while, I decided to apply for the Blockchain Training Alliance (BTA) Certified Blockchain Security Professional Certification, CBSP for short. The exam covers the basics of blockchain consensus algorithms, advanced blockchain security mechanisms (permissioned blockchains, checkpointing, multisignatures, ring signatures, stealth transactions, confidential transactions, zero-knowledge proofs and Pedersen commitments), network-level attacks (51%…
Read more

Interactsh: Open-Source OOB solution for SSRF, Blind SQLi, … in Kali Linux

Project Discovery, the same people behind Nuclei scanner that allows you to customize vulnerability scanning from YAML templates, just released another awesome project called Interactsh. To keep it quick and short, it’s a free alternative to Burpsuite Collaborator for free that you can use in their SaaS platform or just deploy it in your own…
Read more

Cybersecurity Android Apps

Hacking Android apps in Windows with Frida (Part I)

Frida is a dynamic instrumentation toolkit to debug and analyze processes in multiple platforms (Windows, Linux, MacOS, Android, iOS, …). First thing before install frida-tools, you we’ll need python 3.x and pip tool. After that you can install easily Frida opening the Command Prompt as Administrator: That’s all you need in your laptop. As frida…
Read more

Fuzzing with Radamsa in BlackArch

Radamsa is a test case generator, it receives some input data and then it scrambles it to return some random data. Random is truly random, that means that you can even receive the same string 🙂 Unfortunatelly radamsa doesn’t come by default in BlackArch nor Kali Linux, so we have to build it and install…
Read more

Best Portswigger Burpsuite Pro plugins in 2021

protobuf decoding https://github.com/nccgroup/blackboxprotobuf J2EEScan https://portswigger.net/bappstore/7ec6d429fed04cdcb6243d8ba7358880 ParamMiner https://portswigger.net/bappstore/17d2949a985c4b7ca092728dba871943 Upload Scanner https://portswigger.net/bappstore/b2244cbb6953442cb3c82fa0a0d908fa Retire.js https://portswigger.net/bappstore/36238b534a78494db9bf2d03f112265c Msgpack https://portswigger.net/bappstore/c199ec3330864d548ff7d6bf761960ba Turbo Intruder https://portswigger.net/bappstore/9abaa233088242e8be252cd4ff534988 More on https://pentestwiki.org/tools-for-web-penetration-testing/

How to disguise a covert channel with netcat like a harmless command

One of the most important steps after the post-exploitation is to cover our activities and maintain access to the target. In Linux, BSD or Unix we can easily disguise a process name to hide our covert operations. We can abuse the C function execv() to show one command but execute one completely different. In the…
Read more

Google Dork

Google Dork is an advanced Google search query using special commands such as allinurl, allintitle, etc to leverage Google to find public information. Is also a good way to perform passive reconnaissance. Offensive Security has the major Google Dork database called GHDB: https://www.exploit-db.com/google-hacking-database