Francesco PastorePrivilege Escalation With fail2banA quick start guide for privilege escalation with fail2banApr 15Apr 15
InDevOps.devbyFrancesco PastoreFive Effective Ways to Secure Your Docker ContainersA collection of simple but effective ways to increase the security of your Docker containersApr 14Apr 14
Francesco PastoreCEH #1: Introduction to Ethical HackingA summary of the key topics covered in the first CEH moduleSep 16, 2024Sep 16, 2024
Francesco PastoreExploiting a Flask Server Using a Known Secret KeyHow knowing the secret key of a Flask server can be used to create a custom session cookie and bypass authenticationJan 13Jan 13
Francesco PastoreEnumeration with GobusterA quick start guide on how to use Gobuster for enumerationDec 5, 2024Dec 5, 2024
Francesco PastoreAnalyzing HTTP Packets With Python ScapyAn introduction to the Scapy library for analyzing PCAP files faster and creating advanced filters.Jul 1, 2024Jul 1, 2024
Francesco PastoreBreaking Down the Bit Flipping Attack in AES CBCHow to exploit this type of attack on symmetric ciphers that rely on CBC as a mode of operationApr 1, 2024Apr 1, 2024
Francesco PastoreSQLMap over WebSocketsSQLMap is a powerful open-source tool that is widely used for detecting and exploiting SQL injection vulnerabilities in web applications…Mar 8, 2023Mar 8, 2023
Francesco PastoreTen Resources for Binary ChallengesA collection of some of the most useful resources for binary challengesNov 27, 2022Nov 27, 2022
Francesco PastoreBasic Shellcode ExploitationShellcode is one of the main techniques used in binary challenges, usually to obtain a reverse shell.Oct 9, 2022Oct 9, 2022
Francesco PastoreBasic Password Cracking with HashcatAs a developer, it could be very useful to know how can you test the security of your password hashes. How a hacker could break your…Feb 19, 2022Feb 19, 2022