Open in app
Home
Notifications
Lists
Stories

Write
Dheeraj Deshmukh
Dheeraj Deshmukh

Home
About

Mar 27, 2021

Luanne Walkthrough ️

☠️ Hack The Box ☠️ Hello everyone..!! This is Walkthrough of the Luanne Machine which is now retired . Luanne Machine is rated difficulty level as easy , its release date is 28 Nov 2020 and retired date is 27 Mar 2021. Ip of the machine is 10.10.10.218 . Let Start… Port Scanning : Nmap Command : nmap -v…

Hackthebox

7 min read

Luanne Walkthrough ️
Luanne Walkthrough ️

Mar 14, 2021

XSS(Cross Site Scripting) : The Known Vulnerability

Hello Everyone, in this blog we are going to learn all about XSS( cross site scripting) attack.This is well known and most comman vulnerability found in web application . In this we cover what is xss , types of xss : Reflected Xss , Stored Xss , DOM-Based Xss …

Xss Attack

7 min read

XSS(Cross Site Scripting) : The Known Vulnerability
XSS(Cross Site Scripting) : The Known Vulnerability

Feb 23, 2021

Buffer Overflow Attack ( Part - II)— Mona Script

Hello Everyone !! , Hope you have read the first part of buffer overflow attack in which we have discussed in detail about, what is buffer , buffer overflow , buffer overflow attack,types of buffer overflow attack , impact of buffer overflow attack and we exploited SLmail service in which…

Buffer Overflow

6 min read

Buffer Overflow Attack ( Part - II)— Mona Script
Buffer Overflow Attack ( Part - II)— Mona Script

Published in System Weakness

·Feb 11, 2021

Buffer Overflow Attack — Exploit Stack Based Buffer Overflow

Hello Everyone, in this blog we are going to learn about the Buffer Overflow attack and specially a Stack based Buffer Overflow attack . We exploit SLmail service of windows 7 which have vulnerability of buffer overflow , we exploit it in detail and maually step by step.You …

Buffer Overflow

8 min read

Buffer Overflow Attack — Exploit Stack Based Buffer Overflow
Buffer Overflow Attack — Exploit Stack Based Buffer Overflow

Dec 29, 2020

SQL INJECTION — The Coolest Vulnerability

Hello Everyone, in this blog we are going to learn all about the sql injection, Im very exited to write this blog because this is one of the my favourite vulnerability in injection attacks .In this we will cover the topics like what is sql injection, types of sql injection…

Sqli

14 min read

SQL INJECTION — The Coolest Vulnerability
SQL INJECTION — The Coolest Vulnerability

Dec 25, 2020

Get Reverse Shell Through Log Poisoning with the Vulnerability of — LFI ( LOCAL FILE INCLUSION )

Introduction :- This post is about to get the reverse shell through log poisoning, in this post we are going to discuss about what is Lfi, examples of lfi vulnerable code, how to get reverse shell through Log Poisoning with the lfi vulnerability and practicle also included . LFI :- …

Lfi

8 min read

Get Reverse Shell Through Log Poisoning with the Vulnerability of — LFI ( LOCAL FILE INCLUSION )
Get Reverse Shell Through Log Poisoning with the Vulnerability of — LFI ( LOCAL FILE INCLUSION )

Published in System Weakness

·Dec 12, 2020

DoS & DDoS ATTACK….

Introduction to Dos attack :- Dos attack(Denial-of-Service) is a cyber attack in which attacker send lots of requests(traffic) simultaneously at a time to the target server or network, due to which it become overload and the services of that server or network goes down temporarily.Target …

Cybersecurity

7 min read

DoS & DDoS ATTACK….
DoS & DDoS ATTACK….
Dheeraj Deshmukh

Dheeraj Deshmukh

OSCP | Penetration Tester

Following
  • l_l__R4v4N__l_l

    l_l__R4v4N__l_l

  • System Weakness

    System Weakness

  • Peterjson

    Peterjson

  • Vanshal Gaur

    Vanshal Gaur

  • Akash Singh

    Akash Singh

See all (36)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Knowable