Yaksas Security

Cyber Security Research

  • Yaksas Security Home
  • Home
  • Yaksas Security Classroom
  • Learn Adversary Emulation
  • Contact Yaksas
Yaksas Blog

CISSP: Everything You Need to Know

Durpalgeddon2: Patch or Be Hacked

Career in Cyber Security

Cyber Security Education & Career

SLAE: Assignment #4

Uday Mittal January 22, 2019 Leave a Comment

SLAE: Assignment #4

Assignment Task: Create a custom encoding scheme, similar to “Insertion Encoder” PoC with using execve-stack as the shellcode to encode with schema and execute The encoding scheme chosen for this assigmnet is AddWelve encoding scheme. It is a variant of caesar cipher in which the byte is shifted forward 12 bytes. The algorithm is as […]

Filed Under: Skills Development, SLAE

SLAE: Assignment #3

Uday Mittal January 22, 2019 Leave a Comment

SLAE: Assignment #3

Assignment Task: Study about the Egg Hunter shellcode Create a working demo of the Egghunter Should be configurable for different payloads About Egg Hunters Egg Hunter is a mechanism to locate a piece of code in an application’s Virtual Address Space (VAS). This technique is primarily used in exploits where the accessible buffer space is […]

Filed Under: Skills Development, SLAE

SLAE: Assignment #6

Uday Mittal January 16, 2019 Leave a Comment

SLAE: Assignment #6

Assignment Task: Take up 3 shellcodes from Shell-Storm and create polymorphic versions of them to beat pattern matching The polymorphic versions cannot be larger 150% of the existing shellcode Shellcode 1: shutdown -h now Shell-Storm Link: http://shell-storm.org/shellcode/files/shellcode-876.php The original shellcode was 56 bytes in size. Link to original code: https://github.com/yaksas443/SLAE/blob/master/Assignment%206/6-1/shellcode-6-1-orig.nasm https://github.com/yaksas443/SLAE/blob/master/Assignment%206/6-1/run-shellcode-6-1-orig.c Techniques used to modify […]

Filed Under: Skills Development, SLAE

SLAE: Assignment #2

Uday Mittal January 16, 2019 Leave a Comment

SLAE: Assignment #2

Assignment Task: Create a Shell_Reverse_TCP shellcode Reverse connects to configured IP and Port Execs shell on successful connection IP and Port should be easily configurable The TCP reverse shell is used to connect back to the attacking machine, with an interface to execute commands on the target machine. The TCP reverse shell code consists of […]

Filed Under: Skills Development, SLAE

SLAE: Assignment #1

Uday Mittal January 16, 2019 Leave a Comment

SLAE: Assignment #1

Assignment Task: Create a Shell_Bind_TCP shellcode Binds to a port Execs shell on incoming connection Port number should be easily configurable The TCP bind shell is used to setup a listener (or server) on the target machine which allows the attacker machine to execute commands on the said machine. The TCP bind shell code consists […]

Filed Under: Skills Development, SLAE

Uday Mittal December 9, 2018 Leave a Comment

AttackDefense: Meterpreter Basics Walk-through

This video gives a walk-through of AttackDefense Meterpreter Basics lab. To visit AttackDefense Labs, use the following URL: http://public.attackdefense.com/

Filed Under: Hacks

Uday Mittal November 27, 2018 Leave a Comment

AttackDefense: TShark Basics Walk-through

This video gives a walk-through of AttackDefense TShark Basics lab. To visit AttackDefense Labs, use the following URL: http://public.attackdefense.com/  

Filed Under: Under the Hood

Uday Mittal May 6, 2018 Leave a Comment

Steal Windows Credentials using a PDF File (NTLM Hash)

This video demonstrates the recently discovered NTLM hash leak vulnerability via the PDF files.

Filed Under: Awareness Tagged With: BadPDF, NTLM Hash leak, Password, pdf, phishing, Steal windown username and password, username, Windows

Uday Mittal May 4, 2018 Leave a Comment

Hack Windows 7 SP1 in 3 mins: Using NSA Hacking Tools

In this video, see NSA hacking tools in action. It is easy to hack Windows machines using these tools. It uses EternalBlue vulnerability and DoublePulsar backdoor implant tool.

Filed Under: Awareness Tagged With: doublepulsar, empire, equation group, eternalblue, fuzzbunch, NSA, Shadow broker, smb exploit

Uday Mittal April 28, 2018 Leave a Comment

Durpalgeddon2: Patch or Be Hacked

This video gives a brief overview of Drupal vulnerability, Drupalgeddon 2. It also shows how to exploit drupalgeddon2.

Filed Under: Awareness Tagged With: Drupal, Drupalgeddon2, Drupalgeddon2 exploit, hack drupal

  • « Previous Page
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • …
  • 9
  • Next Page »

Optin Form

Search

Follow us on Twitter

My Tweets

Categories

Tags

(ISC)2 Active directory adsecurity adsi adsisearcher adversary emulation Android attack active directory awareness blue whale challenge Certification CISSP Cloud security crte crtp cyber-warfare cybersecurity Cyber Security Cybersecurity books domain enumeration ethical hacking forest enumeration hacker Information Security ISACA Kali Linux Mobile Security Narendra Modi NSA offensive security Online Safety opsec Password Penetration Testing pentest powersploit Powerview privacy red team red teaming Risk Management Social Engineering user enumeration Wifi Windows

Top Posts

  • Mona.py for exploit devs: 6 must know commands
    Mona.py for exploit devs: 6 must know commands
  • What is Adversary Emulation?
    What is Adversary Emulation?
  • Build Your Career in Cyber Security
    Build Your Career in Cyber Security
  • CISA: Everything You Need to Know
    CISA: Everything You Need to Know
  • Let there be no more MMS Scandals
    Let there be no more MMS Scandals
  • 7 Ways to Cover Your Device's Camera
    7 Ways to Cover Your Device's Camera

© Copyright 2020 ElliteDevs · All Rights Reserved · Powered by WordPress