Author: admin

Compromising Domain Admin in Internal Pentest

Following blog post is nothing but a copy of actual post from my friend‘s post on getting domain admin in internal penetration testing. It is very simple and easy to understand so thought of putting it on my website. First

Posted in Hacking, Operating System, Security Tagged with: , , ,

AnDroid Hacking with Metaploit

With tool set currently available, hacking is become very easy. One of the example that we are going to demonstrate is Android hacking. Getting access to handheld devices is becoming more interesting due to kind of applications which are available

Posted in Android, Hacking Tagged with: , , , , ,

Why so many svchost.exe running

The last time I was checking the Task Manager in windows I was surprised to see the number of svchost.exe processes running. So, did some Google and here I came up with this. This blog try to explain the background

Posted in Operating System, Windows 7

Good Reads For Information Security Domain

For February 2016 OpenSSL Releases Security Advisory for Several Vulnerabilities https://mta.openssl.org/pipermail/openssl-announce/2016-March/000066.html https://drownattack.com/ Drupal Releases Critical Security Advisory for Multiple Vulnerabilities https://www.drupal.org/SA-CORE-2016-001 Google Project Zero: The Definitive Guide on Win32 to NT Path Conversion https://googleprojectzero.blogspot.com/2016/02/the-definitive-guide-on-win32-to-nt.html Angler Attempts to Slip The Hook http://blog.talosintel.com/2016/03/angler-slips-hook.html?f_l=s

Posted in ASP.NET, Azure, Database, iPhone Apps, JQUERY, JSON, LINQ, Operating System, Programming Language, Secure .NET Coding, Security, Sharepoint, Sharepoint Security, Silverlight, SQL Server, Visual Studio, WCF (Windows Communication Framework), Windows 7, WPF (Windows Presentation Framework), XML Tagged with: , ,

Logging In MySQL

Scope: This article demonstrates logging techniques in MySQL to uncover and analyze any mischief attempts done by (outside or inside) user focusing on specific areas in database. Getting Started: Following are the types of logs available in MySQL[1]. Log Type

Posted in Programming Language

Android APP Lock By-Pass

I have been using the Innovation of Year device known Samsung Galaxy Note GT-N7000, and in order to prevent my Image gallery from my notorious friend, who has bad habit to dig into my personal pictures. I installed the App

Posted in Programming Language

0wn!ng using xp_cmdshell

Background Well we all know “xp_cmdshell” and its history. It is a windows shell that gets spawns and uses string argument for command execution. The point is what the big deal? Impact The moment you get the access of the

Posted in Database, Secure .NET Coding, Security, SQL Server Tagged with: ,

Change Registered User in Windows

Background It is been question in my mind for long time that when ever we install an application mostly we see the dialog box filled with name. Always wondered from where it came from. Finally came to know that this

Posted in Operating System, Security, Windows 7 Tagged with:

Run Code by impersonating user privilege

Background In my previous post I have explained that how to perform operations on local system using ASP.NET. After using it and putting the same code in testing environment I realize that I throws access denied error when normal user

Posted in ASP.NET, Programming Language, Secure .NET Coding, Security, Sharepoint Security Tagged with: ,

Using Directory Services for LOCAL SYSTEM

Background I have been given a task to work with windows users through web, task like change password, etc. I tried searching for articles for the same to finish this asap. But it took more time as all articles were

Posted in ASP.NET, Operating System, Programming Language, Windows 7