EnumProcess Function Windows also contains the additional API EnumProcesses to gather the process IDs for every running process in the system. It is one of the simplest and easiest functions to gat...
Offensive C++ - Process Enumeration (Windows Terminal Services API)
Windows Terminal Services - WTS API Windows also contains WTSEnumerateProcessesExW function to gather inforamtion about currently active processes on the remote session via RDP or Virualization. It...
Offensive C++ - Process Enumeration (ToolHelp32 Function)
This blog assumes that the reader has a general knowledge of C++ and system internals. For an initial overview, you can refer to this blog. However, it is still under development. Process Enumerat...
Offensive C++ Basics
Supposed to be Intro The code snippet below and its explanations cover various useful Windows functions and APIs that can be implemented using the C++ language for system programming purposes. Her...
Red Teaming - Pivoting Perspectives
Alright, imagine this hilarious little memo I wrote down for my future self: “Yo, Future Me! I made this easy-peasy guide for ya, just in case you hack into that machine someday. No hacking stuff h...
Red Teaming - Havoc C2 Team Server and Profiles
The Team Server The C2 Profiles You can probably refer to the Havoc’s documentation to understand the basic syntax of the profile in detail. I will try to explain the default havoc profile which i...
Red Teaming - Havoc C2
Introduction C2 frameworks, also known as command and control, enables red teamers to control and communicate with compromised systems. Havoc is a modern and malleable post-exploitation command and...
HTB - PC
HTB — PC A detailed walkthrough for solving PC on HTB. The box contains vulnerability like SQL Injection, Plaintext credential on the database, and privilege escalation through PyLoad. Enumerat...
HTB - MonitorsTwo
HTB — MonitorsTwo A detailed walkthrough for solving MonitorsTwo on HTB. The box contains vulnerability like default credentials, CVE-2022–46169 Cacti Remote Code Execution and Privilege Escalatio...
HTB - Only4You
HTB — Only4You A detailed walkthrough for solving Only4You on HTB. The box contains vulnerability like File Inclusion, Weak Credentials, Cypher Injection, Command Injection and privilege escalatio...