Home
r0b0tG4nG
Cancel

My OSCP Journey - The Untold Story

> Who am i?? I’m Saeed Bala Ahmed, a great fan of “Mr. Robot Series” where I got my nickname r0b0tG4nG. I am an offensive security engineer with 4 years of experience in the cybersecurity field. I currently work...

My OSWA Journey - New Age Begins

> What is WEB-200?? WEB-200 is an Offensive Security course that teaches students how to discover and exploit common web vulnerabilities, and how to exfiltrate sensitive data from target web applications. Stude...

Exploiting RocketChat [ Message Dump To RCE ]

> Information Gathering During our previous engagement on Exploiting Jfrog Artifactory webapp, we leaked some files from the development share. Today’s engagement, we will look at how to dump messages from the ...

Exploiting Jfrog Artifactory [ Server-side Request Forgery ]

> Information Gathering From nmap scan, we found a web app running on port 8081. Navigating to port 8081 on the browser, we discovered Jfrog Artifactory running on the target and we were redirected to a login ...

Kerberoasting Using Mssql Server [ Abusing GenericAll ]

> Information Gathering From The previous writeup on Abusing MSSQL Linked Servers, we found credentials on the target. In this chapter, we will look at how we can perform kerberoast attacks through MSSQL Server...