Vkie's Threat Intel
Visit Website Homepage IP Address Reputation Lookup Result Option for to Copy Queries also it displays reports if available in public for that IoC. Domain Reputation Lookup Result ...
Visit Website Homepage IP Address Reputation Lookup Result Option for to Copy Queries also it displays reports if available in public for that IoC. Domain Reputation Lookup Result ...
Target - 10.129.150.71 To find open ports, do nmap -F {target} As seen we noticed 3 open ports lets enumerate FTP, lets try anonymous login As per above Screenshot anonymous login not worke...
Target - 10.129.228.217 Do nmap on target with - nmap -F {target} to see open ports. As seen in nmap results, we can see ssh and 80 port is open, when we navigate to 80, we found the url chang...
Setup on Host A: Install proxy server Squid on Host A . By default Squid listens on port 3128. yum install squid Comment the http_access deny all then add http_access allow all in /etc/squid...
Load Invisishell first Then Load PowerView by dot sourcing . \<path to the script> . C:\AD\Tools\PowerView.ps1 Domain Enumeration Get domain gives you info about current forest Get-D...
In this blog we will get to know how to install IBM Qradar, in both AWS and in local VM, Installing in AWS Go AWS console, then in search and go to “Amazon Marketplace” Go to Discover produc...
In this blog we going to see how to set our own private search engine called SearXNG , without wasting time lets get into topic. in this ill share 2 methods to deploy searxng. why we need private...
In this blog we going to deploy our own ChatGPT like Assistant, using Ollama Ever heard of Ollama? Ollama is a software platform designed to simplify the deployment and management of AI models on...
Summary In this guide we will exploit an arbitary file upload in the wpDiscuz version 7.0.4 plugin and obtain root access with a simple and straightforward method of privilege escalation. Enumera...
Summary This machine is exploited by disclosure of a user name and a very obscure password. It is escalated via a local Linux kernel exploit. Enumeration Nmap We start off by running an nmap sc...