Francesco PastoreEnumeration with GobusterA quick start guide on how to use Gobuster for enumerationDec 5, 2024Dec 5, 2024
Francesco PastoreAnalyzing HTTP Packets With Python ScapyAn introduction to the Scapy library for analyzing PCAP files faster and creating advanced filters.Jul 1, 2024Jul 1, 2024
Francesco PastoreBreaking Down the Bit Flipping Attack in AES CBCHow to exploit this type of attack on symmetric ciphers that rely on CBC as a mode of operationApr 1, 20241Apr 1, 20241
Francesco PastoreSQLMap over WebSocketsSQLMap is a powerful open-source tool that is widely used for detecting and exploiting SQL injection vulnerabilities in web applications…Mar 8, 20234Mar 8, 20234
Francesco PastoreTen Resources for Binary ChallengesA collection of some of the most useful resources for binary challengesNov 27, 20221Nov 27, 20221
Francesco PastoreBasic Shellcode ExploitationShellcode is one of the main techniques used in binary challenges, usually to obtain a reverse shell.Oct 9, 202240Oct 9, 202240
Francesco PastoreBasic Password Cracking with HashcatAs a developer, it could be very useful to know how can you test the security of your password hashes. How a hacker could break your…Feb 19, 202210Feb 19, 202210