by pentaROOT | Mar 30, 2018 | Exploitation
This tutorial demonstrates creating a reverse shell on a device through WordPress. This exploit is useful for many CTF events and is often found in the wild. For this walkthrough, the WordPress installation on the Mr. Robot VM will be used with an added WordPress...
by pentaROOT | Jan 14, 2018 | Exploitation
This tutorial demonstrates creating remote access on a device using Intel AMT BIOS extension. The exploit was recently explained by F-Secure. The documentation from Intel on AMT can be found here. This tutorial demonstrates access from one Windows device to another on...
by pentaROOT | Nov 8, 2017 | Education
There are five phases of penetration testing. While others may break these down further, these five phases summarize the process of any penetration test. These phases may be done in any order, but are typically accomplished as outlined here. Ethical tests commonly...