Open in app

Sign In

Write

Sign In

Dheeraj Deshmukh
Dheeraj Deshmukh

70 Followers

Home

About

Mar 27, 2021

Luanne Walkthrough ️

☠️ Hack The Box ☠️ Hello everyone..!! This is Walkthrough of the Luanne Machine which is now retired . Luanne Machine is rated difficulty level as easy , its release date is 28 Nov 2020 and retired date is 27 Mar 2021. Ip of the machine is 10.10.10.218 . Let Start… Port Scanning : Nmap Command : nmap -v…

Hackthebox

7 min read

Luanne Walkthrough ️
Luanne Walkthrough ️
Hackthebox

7 min read


Mar 14, 2021

XSS(Cross Site Scripting) : The Known Vulnerability

Hello Everyone, in this blog we are going to learn all about XSS( cross site scripting) attack.This is well known and most comman vulnerability found in web application . In this we cover what is xss , types of xss : Reflected Xss , Stored Xss , DOM-Based Xss …

Xss Attack

7 min read

XSS(Cross Site Scripting) : The Known Vulnerability
XSS(Cross Site Scripting) : The Known Vulnerability
Xss Attack

7 min read


Feb 23, 2021

Buffer Overflow Attack ( Part - II)— Mona Script

Hello Everyone !! , Hope you have read the first part of buffer overflow attack in which we have discussed in detail about, what is buffer , buffer overflow , buffer overflow attack,types of buffer overflow attack , impact of buffer overflow attack and we exploited SLmail service in which…

Buffer Overflow

6 min read

Buffer Overflow Attack ( Part - II)— Mona Script
Buffer Overflow Attack ( Part - II)— Mona Script
Buffer Overflow

6 min read


Published in System Weakness

·Feb 11, 2021

Buffer Overflow Attack — Exploit Stack Based Buffer Overflow

Hello Everyone, in this blog we are going to learn about the Buffer Overflow attack and specially a Stack based Buffer Overflow attack . We exploit SLmail service of windows 7 which have vulnerability of buffer overflow , we exploit it in detail and maually step by step.You …

Buffer Overflow

8 min read

Buffer Overflow Attack — Exploit Stack Based Buffer Overflow
Buffer Overflow Attack — Exploit Stack Based Buffer Overflow
Buffer Overflow

8 min read


Dec 29, 2020

SQL INJECTION — The Coolest Vulnerability

Hello Everyone, in this blog we are going to learn all about the sql injection, Im very exited to write this blog because this is one of the my favourite vulnerability in injection attacks .In this we will cover the topics like what is sql injection, types of sql injection…

Sqli

14 min read

SQL INJECTION — The Coolest Vulnerability
SQL INJECTION — The Coolest Vulnerability
Sqli

14 min read


Dec 25, 2020

Get Reverse Shell Through Log Poisoning with the Vulnerability of — LFI ( LOCAL FILE INCLUSION )

Introduction :- This post is about to get the reverse shell through log poisoning, in this post we are going to discuss about what is Lfi, examples of lfi vulnerable code, how to get reverse shell through Log Poisoning with the lfi vulnerability and practicle also included . LFI :- …

Lfi

8 min read

Get Reverse Shell Through Log Poisoning with the Vulnerability of — LFI ( LOCAL FILE INCLUSION )
Get Reverse Shell Through Log Poisoning with the Vulnerability of — LFI ( LOCAL FILE INCLUSION )
Lfi

8 min read


Published in System Weakness

·Dec 12, 2020

DoS & DDoS ATTACK….

Introduction to Dos attack :- Dos attack(Denial-of-Service) is a cyber attack in which attacker send lots of requests(traffic) simultaneously at a time to the target server or network, due to which it become overload and the services of that server or network goes down temporarily.Target …

Cybersecurity

7 min read

DoS & DDoS ATTACK….
DoS & DDoS ATTACK….
Cybersecurity

7 min read

Dheeraj Deshmukh

Dheeraj Deshmukh

70 Followers

OSCP | Penetration Tester

Following
  • MachineX

    MachineX

  • Tushar Singh

    Tushar Singh

  • Peterjson

    Peterjson

  • Raj Singh Chauhan

    Raj Singh Chauhan

  • Vanshal Gaur

    Vanshal Gaur

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech