by pentaROOT | May 2, 2018 | Education
I had the opportunity to contribute to the AlienVault blog as a guest writer. You can view the post here on Social Engineering Tactics or you can read it below. Thanks AlienVault! Social Engineering Tactics A man and a woman are standing side-by-side at...
by pentaROOT | Mar 30, 2018 | Exploitation
This tutorial demonstrates creating a reverse shell on a device through WordPress. This exploit is useful for many CTF events and is often found in the wild. For this walkthrough, the WordPress installation on the Mr. Robot VM will be used with an added WordPress...
by pentaROOT | Feb 16, 2018 | Education
Security assessments and penetration testing may be conducted in many ways and take several different approaches. Each assessment or test is catered to the specific need of the client. This post outlines the differences between internal and external testing. It also...
by pentaROOT | Jan 14, 2018 | Exploitation
This tutorial demonstrates creating remote access on a device using Intel AMT BIOS extension. The exploit was recently explained by F-Secure. The documentation from Intel on AMT can be found here. This tutorial demonstrates access from one Windows device to another on...
by pentaROOT | Dec 6, 2017 | Exploitation, Tools
This tutorial demonstrates how to crack passwords on encrypted ZIP files. The application used for this example is fcrackzip. Software fcrackzip Install fcrackzip Included in Kali Linux If not currently installed on your distro: $sudo apt-get update...