{"version":1,"pages":[{"id":"qEj6yZTNV7Zs9prvFgo4","title":"HackTricks","pathname":"/","siteSpaceId":"sitesp_GuHT9","description":"博客：https://www.xsx.tw/","breadcrumbs":[{"label":"Welcome!","emoji":"1f47e"}]},{"id":"Z1RAQsbNs72Vy8Me0Uax","title":"Pentesting Methodology","pathname":"/generic-methodologies-and-resources/pentesting-methodology","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"}]},{"id":"TpVNhfNzsx8PfKTOSPwt","title":"External Recon Methodology","pathname":"/generic-methodologies-and-resources/external-recon-methodology","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"}]},{"id":"ROjplp2SsFlibhvE0a1q","title":"Wide Source Code Search","pathname":"/generic-methodologies-and-resources/external-recon-methodology/wide-source-code-search","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"External Recon Methodology"}]},{"id":"uA3qOKr2tVAVk8YXbMxO","title":"Github Dorks & Leaks","pathname":"/generic-methodologies-and-resources/external-recon-methodology/github-leaked-secrets","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"External Recon Methodology"}]},{"id":"2zCNK59i2qoD5QEoavOj","title":"Pentesting Network","pathname":"/generic-methodologies-and-resources/pentesting-network","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"}]},{"id":"wUrlYtg6K2yt8q6O4qKJ","title":"DHCPv6","pathname":"/generic-methodologies-and-resources/pentesting-network/dhcpv6","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Pentesting Network"}]},{"id":"3VV9FtmeIQICIMHoMlQW","title":"EIGRP Attacks","pathname":"/generic-methodologies-and-resources/pentesting-network/eigrp-attacks","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Pentesting Network"}]},{"id":"fvFpcdFiNFN3VsY0lLi7","title":"GLBP & HSRP Attacks","pathname":"/generic-methodologies-and-resources/pentesting-network/glbp-and-hsrp-attacks","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Pentesting Network"}]},{"id":"GhNreYkIpZglWPWf1T19","title":"IDS and IPS Evasion","pathname":"/generic-methodologies-and-resources/pentesting-network/ids-evasion","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Pentesting Network"}]},{"id":"oQ5srh42lk0DKvqyIRpY","title":"Lateral VLAN Segmentation Bypass","pathname":"/generic-methodologies-and-resources/pentesting-network/lateral-vlan-segmentation-bypass","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Pentesting Network"}]},{"id":"GMaS5jRZgORygJXTSN3z","title":"Network Protocols Explained (ESP)","pathname":"/generic-methodologies-and-resources/pentesting-network/network-protocols-explained-esp","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Pentesting Network"}]},{"id":"jJiPSV7czhneScIFMSr7","title":"Nmap Summary (ESP)","pathname":"/generic-methodologies-and-resources/pentesting-network/nmap-summary-esp","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Pentesting Network"}]},{"id":"F6eSAMAhGN5XnxXtON7r","title":"Pentesting IPv6","pathname":"/generic-methodologies-and-resources/pentesting-network/pentesting-ipv6","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Pentesting Network"}]},{"id":"GjauOc3bM0I8PrSWsFoL","title":"Spoofing LLMNR, NBT-NS, mDNS/DNS and WPAD and Relay Attacks","pathname":"/generic-methodologies-and-resources/pentesting-network/spoofing-llmnr-nbt-ns-mdns-dns-and-wpad-and-relay-attacks","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Pentesting Network"}]},{"id":"cNxvs7WqkbEI8TvCJK4i","title":"Spoofing SSDP and UPnP Devices with EvilSSDP","pathname":"/generic-methodologies-and-resources/pentesting-network/spoofing-ssdp-and-upnp-devices","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Pentesting Network"}]},{"id":"YTDb3vys6lbuaLRt0iyI","title":"Pentesting Wifi","pathname":"/generic-methodologies-and-resources/pentesting-wifi","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"}]},{"id":"TqOyiKGfyoTNGwLaoOCf","title":"Evil Twin EAP-TLS","pathname":"/generic-methodologies-and-resources/pentesting-wifi/evil-twin-eap-tls","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Pentesting Wifi"}]},{"id":"ojoqERUvQ22fdrEJDiXD","title":"Phishing Methodology","pathname":"/generic-methodologies-and-resources/phishing-methodology","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"}]},{"id":"ky7gfcQhVDg1G1K7agYF","title":"Clone a Website","pathname":"/generic-methodologies-and-resources/phishing-methodology/clone-a-website","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Phishing Methodology"}]},{"id":"oTf4aTU7gnMoAdtUIYmD","title":"Detecting Phishing","pathname":"/generic-methodologies-and-resources/phishing-methodology/detecting-phising","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Phishing Methodology"}]},{"id":"B5TvJFi2OSEBiqjVXfbV","title":"Phishing Files & Documents","pathname":"/generic-methodologies-and-resources/phishing-methodology/phishing-documents","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Phishing Methodology"}]},{"id":"2azYy1CnpZv7LLgLWwdR","title":"Basic Forensic Methodology","pathname":"/generic-methodologies-and-resources/basic-forensic-methodology","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"}]},{"id":"3YukXsWK5ozpKZSdy5FA","title":"Baseline Monitoring","pathname":"/generic-methodologies-and-resources/basic-forensic-methodology/file-integrity-monitoring","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Basic Forensic Methodology"}]},{"id":"lL3dDwWomcJ2QxppRKJJ","title":"Anti-Forensic Techniques","pathname":"/generic-methodologies-and-resources/basic-forensic-methodology/anti-forensic-techniques","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Basic Forensic Methodology"}]},{"id":"iSvAMqfYjXgL23HhGhzF","title":"Docker Forensics","pathname":"/generic-methodologies-and-resources/basic-forensic-methodology/docker-forensics","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Basic Forensic Methodology"}]},{"id":"fYXFr611WCdQcIJ8h5bp","title":"Image Acquisition & Mount","pathname":"/generic-methodologies-and-resources/basic-forensic-methodology/image-acquisition-and-mount","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Basic Forensic Methodology"}]},{"id":"oVsJSNoFq5w0kOSy2srd","title":"Linux Forensics","pathname":"/generic-methodologies-and-resources/basic-forensic-methodology/linux-forensics","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Basic Forensic Methodology"}]},{"id":"AFkJWcUpYjxhknRqk3TL","title":"Malware Analysis","pathname":"/generic-methodologies-and-resources/basic-forensic-methodology/malware-analysis","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Basic Forensic Methodology"}]},{"id":"4o8Zq3oXwodn8ODQ5U81","title":"Memory dump analysis","pathname":"/generic-methodologies-and-resources/basic-forensic-methodology/memory-dump-analysis","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Basic Forensic Methodology"}]},{"id":"Yvln71LBbqWWqbZIQuvq","title":"Volatility - CheatSheet","pathname":"/generic-methodologies-and-resources/basic-forensic-methodology/memory-dump-analysis/volatility-cheatsheet","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Basic Forensic Methodology"},{"label":"Memory dump analysis"}]},{"id":"FEphlNPNIgkls7yGdCKs","title":"Partitions/File Systems/Carving","pathname":"/generic-methodologies-and-resources/basic-forensic-methodology/partitions-file-systems-carving","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Basic Forensic Methodology"}]},{"id":"m2o6z9N7csQIkly44fpk","title":"File/Data Carving & Recovery Tools","pathname":"/generic-methodologies-and-resources/basic-forensic-methodology/partitions-file-systems-carving/file-data-carving-recovery-tools","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Basic Forensic Methodology"},{"label":"Partitions/File Systems/Carving"}]},{"id":"bXoxFFucoHBjvTCp3rvP","title":"Pcap Inspection","pathname":"/generic-methodologies-and-resources/basic-forensic-methodology/pcap-inspection","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Basic Forensic Methodology"}]},{"id":"laPtsOAwgHQ4JF9lFWP0","title":"DNSCat pcap analysis","pathname":"/generic-methodologies-and-resources/basic-forensic-methodology/pcap-inspection/dnscat-exfiltration","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Basic Forensic Methodology"},{"label":"Pcap Inspection"}]},{"id":"A8WD3S0Yh9kVSup5JIBn","title":"Suricata & Iptables cheatsheet","pathname":"/generic-methodologies-and-resources/basic-forensic-methodology/pcap-inspection/suricata-and-iptables-cheatsheet","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Basic Forensic Methodology"},{"label":"Pcap Inspection"}]},{"id":"YxVB7bCj0ieKULPu7jmt","title":"USB Keystrokes","pathname":"/generic-methodologies-and-resources/basic-forensic-methodology/pcap-inspection/usb-keystrokes","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Basic Forensic Methodology"},{"label":"Pcap Inspection"}]},{"id":"hdFBg4PN41xsfBwphWMC","title":"Wifi Pcap Analysis","pathname":"/generic-methodologies-and-resources/basic-forensic-methodology/pcap-inspection/wifi-pcap-analysis","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Basic Forensic Methodology"},{"label":"Pcap Inspection"}]},{"id":"GZ4nzjMx608pNCOGxZRa","title":"Wireshark tricks","pathname":"/generic-methodologies-and-resources/basic-forensic-methodology/pcap-inspection/wireshark-tricks","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Basic Forensic Methodology"},{"label":"Pcap Inspection"}]},{"id":"pI9JRjls0cc8aKSAoJq9","title":"Specific Software/File-Type Tricks","pathname":"/generic-methodologies-and-resources/basic-forensic-methodology/specific-software-file-type-tricks","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Basic Forensic Methodology"}]},{"id":"A725x1UZDCSx2vkavFKu","title":"Decompile compiled python binaries (exe, elf) - Retreive from .pyc","pathname":"/generic-methodologies-and-resources/basic-forensic-methodology/specific-software-file-type-tricks/.pyc","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Basic Forensic Methodology"},{"label":"Specific Software/File-Type Tricks"}]},{"id":"8iPu0c7ZAsqDdLY0ln1K","title":"Browser Artifacts","pathname":"/generic-methodologies-and-resources/basic-forensic-methodology/specific-software-file-type-tricks/browser-artifacts","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Basic Forensic Methodology"},{"label":"Specific Software/File-Type Tricks"}]},{"id":"PDh70A3EPXbpB4E1nlQU","title":"Deofuscation vbs (cscript.exe)","pathname":"/generic-methodologies-and-resources/basic-forensic-methodology/specific-software-file-type-tricks/desofuscation-vbs-cscript.exe","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Basic Forensic Methodology"},{"label":"Specific Software/File-Type Tricks"}]},{"id":"bituGrfskB8yrKI76Geb","title":"Local Cloud Storage","pathname":"/generic-methodologies-and-resources/basic-forensic-methodology/specific-software-file-type-tricks/local-cloud-storage","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Basic Forensic Methodology"},{"label":"Specific Software/File-Type Tricks"}]},{"id":"DgomT4GOalpEB3i0UdEr","title":"Office file analysis","pathname":"/generic-methodologies-and-resources/basic-forensic-methodology/specific-software-file-type-tricks/office-file-analysis","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Basic Forensic Methodology"},{"label":"Specific Software/File-Type Tricks"}]},{"id":"xJUV0e2MXy1Ah1vRtTv6","title":"PDF File analysis","pathname":"/generic-methodologies-and-resources/basic-forensic-methodology/specific-software-file-type-tricks/pdf-file-analysis","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Basic Forensic Methodology"},{"label":"Specific Software/File-Type Tricks"}]},{"id":"lb6BPcWyBN3PpRounWZT","title":"PNG tricks","pathname":"/generic-methodologies-and-resources/basic-forensic-methodology/specific-software-file-type-tricks/png-tricks","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Basic Forensic Methodology"},{"label":"Specific Software/File-Type Tricks"}]},{"id":"zeLgt8R5cD9Gj9av2LBM","title":"Video and Audio file analysis","pathname":"/generic-methodologies-and-resources/basic-forensic-methodology/specific-software-file-type-tricks/video-and-audio-file-analysis","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Basic Forensic Methodology"},{"label":"Specific Software/File-Type Tricks"}]},{"id":"87ARo9Le9rOVj7iKJjXp","title":"ZIPs tricks","pathname":"/generic-methodologies-and-resources/basic-forensic-methodology/specific-software-file-type-tricks/zips-tricks","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Basic Forensic Methodology"},{"label":"Specific Software/File-Type Tricks"}]},{"id":"ykoz3zsbAu4erV7CUmJj","title":"Windows Artifacts","pathname":"/generic-methodologies-and-resources/basic-forensic-methodology/windows-forensics","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Basic Forensic Methodology"}]},{"id":"RWD0KRM49oXsagWXsYWP","title":"Interesting Windows Registry Keys","pathname":"/generic-methodologies-and-resources/basic-forensic-methodology/windows-forensics/interesting-windows-registry-keys","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Basic Forensic Methodology"},{"label":"Windows Artifacts"}]},{"id":"uNVBv5b8gR1BNEahtlHa","title":"Brute Force - CheatSheet","pathname":"/generic-methodologies-and-resources/brute-force","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"}]},{"id":"zsi70QKRri5Dw38IOZbg","title":"Python Sandbox Escape & Pyscript","pathname":"/generic-methodologies-and-resources/python","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"}]},{"id":"3BPEOUUqev1SBMucQAtz","title":"Bypass Python sandboxes","pathname":"/generic-methodologies-and-resources/python/bypass-python-sandboxes","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Python Sandbox Escape & Pyscript"}]},{"id":"K8MPKhucF9scUxiiMegQ","title":"LOAD_NAME / LOAD_CONST opcode OOB Read","pathname":"/generic-methodologies-and-resources/python/bypass-python-sandboxes/load_name-load_const-opcode-oob-read","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Python Sandbox Escape & Pyscript"},{"label":"Bypass Python sandboxes"}]},{"id":"Ym16jOuCLbdo9YUtm4Ku","title":"Class Pollution (Python's Prototype Pollution)","pathname":"/generic-methodologies-and-resources/python/class-pollution-pythons-prototype-pollution","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Python Sandbox Escape & Pyscript"}]},{"id":"cUYy4tbIRtwbQ5KNZ6PA","title":"Python Internal Read Gadgets","pathname":"/generic-methodologies-and-resources/python/python-internal-read-gadgets","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Python Sandbox Escape & Pyscript"}]},{"id":"HgHTkcvyHJl2P3aoJ4nY","title":"Pyscript","pathname":"/generic-methodologies-and-resources/python/pyscript","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Python Sandbox Escape & Pyscript"}]},{"id":"Hz91OqRuW5pHGmV9XDxi","title":"venv","pathname":"/generic-methodologies-and-resources/python/venv","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Python Sandbox Escape & Pyscript"}]},{"id":"ZZjAmmRToSWrYdEvMWpL","title":"Web Requests","pathname":"/generic-methodologies-and-resources/python/web-requests","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Python Sandbox Escape & Pyscript"}]},{"id":"CMh43G50yDjelKIZBZte","title":"Bruteforce hash (few chars)","pathname":"/generic-methodologies-and-resources/python/bruteforce-hash-few-chars","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Python Sandbox Escape & Pyscript"}]},{"id":"HxNgaZxhtAWlnZCM3LYO","title":"Basic Python","pathname":"/generic-methodologies-and-resources/python/basic-python","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Python Sandbox Escape & Pyscript"}]},{"id":"HG9YNPAPsXTbZ2PlEKJT","title":"Exfiltration","pathname":"/generic-methodologies-and-resources/exfiltration","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"}]},{"id":"eVLWYhkSUMlLwIiEomD4","title":"Tunneling and Port Forwarding","pathname":"/generic-methodologies-and-resources/tunneling-and-port-forwarding","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"}]},{"id":"BrDQRWAtvcGGb1gdLMX0","title":"Threat Modeling","pathname":"/generic-methodologies-and-resources/threat-modeling","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"}]},{"id":"ygDV1F1sILF810P1PSIp","title":"Search Exploits","pathname":"/generic-methodologies-and-resources/search-exploits","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"}]},{"id":"Qyy58z0Ewes5YLxHXUpN","title":"Shells (Linux, Windows, MSFVenom)","pathname":"/generic-methodologies-and-resources/shells","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"}]},{"id":"1WYKemGMeV6f9O3Qh7uf","title":"MSFVenom - CheatSheet","pathname":"/generic-methodologies-and-resources/shells/msfvenom","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Shells (Linux, Windows, MSFVenom)"}]},{"id":"cPMSMyrThNmyKFDdtAOo","title":"Shells - Windows","pathname":"/generic-methodologies-and-resources/shells/windows","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Shells (Linux, Windows, MSFVenom)"}]},{"id":"P3fyCRAhULVwFDzVEsNx","title":"Shells - Linux","pathname":"/generic-methodologies-and-resources/shells/linux","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Shells (Linux, Windows, MSFVenom)"}]},{"id":"N5Z7yB4wz3CVynvmOMhm","title":"Full TTYs","pathname":"/generic-methodologies-and-resources/shells/full-ttys","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Generic Methodologies & Resources","emoji":"1f929"},{"label":"Shells (Linux, Windows, MSFVenom)"}]},{"id":"oaXScGm3G5Cnv6yCHQQi","title":"Checklist - Linux Privilege Escalation","pathname":"/linux-hardening/linux-privilege-escalation-checklist","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"}]},{"id":"4YAADTUcc2h83GJ8htle","title":"Linux Privilege Escalation","pathname":"/linux-hardening/privilege-escalation","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"}]},{"id":"ikquNR2ZrZiE2mC9Yt6P","title":"Arbitrary File Write to Root","pathname":"/linux-hardening/privilege-escalation/write-to-root","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"},{"label":"Linux Privilege Escalation"}]},{"id":"3wNp1MGxfEcioJY7YgTd","title":"Cisco - vmanage","pathname":"/linux-hardening/privilege-escalation/cisco-vmanage","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"},{"label":"Linux Privilege Escalation"}]},{"id":"8CWurA8rSPmCclFK4HBY","title":"Containerd (ctr) Privilege Escalation","pathname":"/linux-hardening/privilege-escalation/containerd-ctr-privilege-escalation","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"},{"label":"Linux Privilege Escalation"}]},{"id":"wY0pnkObdSJjFYuGxUg7","title":"D-Bus Enumeration & Command Injection Privilege Escalation","pathname":"/linux-hardening/privilege-escalation/d-bus-enumeration-and-command-injection-privilege-escalation","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"},{"label":"Linux Privilege Escalation"}]},{"id":"zcVYraL309wKa4F2QNBc","title":"Docker Security","pathname":"/linux-hardening/privilege-escalation/docker-security","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"},{"label":"Linux Privilege Escalation"}]},{"id":"mukscbDlC1EloqOXPHjA","title":"Abusing Docker Socket for Privilege Escalation","pathname":"/linux-hardening/privilege-escalation/docker-security/abusing-docker-socket-for-privilege-escalation","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"},{"label":"Linux Privilege Escalation"},{"label":"Docker Security"}]},{"id":"P5pHWnFIwvKmCo10fXVx","title":"AppArmor","pathname":"/linux-hardening/privilege-escalation/docker-security/apparmor","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"},{"label":"Linux Privilege Escalation"},{"label":"Docker Security"}]},{"id":"Dycn3SlaTWOK21Spbaam","title":"AuthZ& AuthN - Docker Access Authorization Plugin","pathname":"/linux-hardening/privilege-escalation/docker-security/authz-and-authn-docker-access-authorization-plugin","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"},{"label":"Linux Privilege Escalation"},{"label":"Docker Security"}]},{"id":"H2m0sRTsCvQlDUn8X4OF","title":"CGroups","pathname":"/linux-hardening/privilege-escalation/docker-security/cgroups","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"},{"label":"Linux Privilege Escalation"},{"label":"Docker Security"}]},{"id":"VqxY9enXaUhxG5YrRzAl","title":"Docker --privileged","pathname":"/linux-hardening/privilege-escalation/docker-security/docker-privileged","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"},{"label":"Linux Privilege Escalation"},{"label":"Docker Security"}]},{"id":"VuwzlEJqQFRmCeleFY1v","title":"Docker Breakout / Privilege Escalation","pathname":"/linux-hardening/privilege-escalation/docker-security/docker-breakout-privilege-escalation","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"},{"label":"Linux Privilege Escalation"},{"label":"Docker Security"}]},{"id":"reNpDAafackWz5RVgJXa","title":"release_agent exploit - Relative Paths to PIDs","pathname":"/linux-hardening/privilege-escalation/docker-security/docker-breakout-privilege-escalation/release_agent-exploit-relative-paths-to-pids","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"},{"label":"Linux Privilege Escalation"},{"label":"Docker Security"},{"label":"Docker Breakout / Privilege Escalation"}]},{"id":"7d4vKdz6tBVK6y7ZBPld","title":"Docker release_agent cgroups escape","pathname":"/linux-hardening/privilege-escalation/docker-security/docker-breakout-privilege-escalation/docker-release_agent-cgroups-escape","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"},{"label":"Linux Privilege Escalation"},{"label":"Docker Security"},{"label":"Docker Breakout / Privilege Escalation"}]},{"id":"l1LQIdZafFIUhdFu2AHZ","title":"Sensitive Mounts","pathname":"/linux-hardening/privilege-escalation/docker-security/docker-breakout-privilege-escalation/sensitive-mounts","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"},{"label":"Linux Privilege Escalation"},{"label":"Docker Security"},{"label":"Docker Breakout / Privilege Escalation"}]},{"id":"qXLWCso3vckmgasNdrOX","title":"Namespaces","pathname":"/linux-hardening/privilege-escalation/docker-security/namespaces","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"},{"label":"Linux Privilege Escalation"},{"label":"Docker Security"}]},{"id":"R8pvbDFcL7vpZfZFbPcg","title":"CGroup Namespace","pathname":"/linux-hardening/privilege-escalation/docker-security/namespaces/cgroup-namespace","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"},{"label":"Linux Privilege Escalation"},{"label":"Docker Security"},{"label":"Namespaces"}]},{"id":"qcZ1WWiM2iaafoKv2NMG","title":"IPC Namespace","pathname":"/linux-hardening/privilege-escalation/docker-security/namespaces/ipc-namespace","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"},{"label":"Linux Privilege Escalation"},{"label":"Docker Security"},{"label":"Namespaces"}]},{"id":"9hjHjlFPDNqWnSs6PLDi","title":"PID Namespace","pathname":"/linux-hardening/privilege-escalation/docker-security/namespaces/pid-namespace","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"},{"label":"Linux Privilege Escalation"},{"label":"Docker Security"},{"label":"Namespaces"}]},{"id":"jkHtIQ3WydsFQYRJxSkQ","title":"Mount Namespace","pathname":"/linux-hardening/privilege-escalation/docker-security/namespaces/mount-namespace","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"},{"label":"Linux Privilege Escalation"},{"label":"Docker Security"},{"label":"Namespaces"}]},{"id":"QZEam0P7MgEBpSp3qlvv","title":"Network Namespace","pathname":"/linux-hardening/privilege-escalation/docker-security/namespaces/network-namespace","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"},{"label":"Linux Privilege Escalation"},{"label":"Docker Security"},{"label":"Namespaces"}]},{"id":"ql0zPXp5r6dlbt4EWb6M","title":"Time Namespace","pathname":"/linux-hardening/privilege-escalation/docker-security/namespaces/time-namespace","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"},{"label":"Linux Privilege Escalation"},{"label":"Docker Security"},{"label":"Namespaces"}]},{"id":"U0Uhd2L9tld93JnIkj4M","title":"User Namespace","pathname":"/linux-hardening/privilege-escalation/docker-security/namespaces/user-namespace","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"},{"label":"Linux Privilege Escalation"},{"label":"Docker Security"},{"label":"Namespaces"}]},{"id":"aALtQ5yzLJl5Fh5dVjTl","title":"UTS Namespace","pathname":"/linux-hardening/privilege-escalation/docker-security/namespaces/uts-namespace","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"},{"label":"Linux Privilege Escalation"},{"label":"Docker Security"},{"label":"Namespaces"}]},{"id":"ESKNypUGgMB6l0TLeMcr","title":"Seccomp","pathname":"/linux-hardening/privilege-escalation/docker-security/seccomp","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"},{"label":"Linux Privilege Escalation"},{"label":"Docker Security"}]},{"id":"KsH6kGP4uKMio0j3qwOs","title":"Weaponizing Distroless","pathname":"/linux-hardening/privilege-escalation/docker-security/weaponizing-distroless","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"},{"label":"Linux Privilege Escalation"},{"label":"Docker Security"}]},{"id":"oWTkng8ckk4TOwT4a6ba","title":"Escaping from Jails","pathname":"/linux-hardening/privilege-escalation/escaping-from-limited-bash","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"},{"label":"Linux Privilege Escalation"}]},{"id":"agi5qWOZTEf8O0ufOWk8","title":"euid, ruid, suid","pathname":"/linux-hardening/privilege-escalation/euid-ruid-suid","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"},{"label":"Linux Privilege Escalation"}]},{"id":"Gupvz9Hx4YHekcwXT5ZQ","title":"Interesting Groups - Linux Privesc","pathname":"/linux-hardening/privilege-escalation/interesting-groups-linux-pe","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"},{"label":"Linux Privilege Escalation"}]},{"id":"yFGEhz03t9vaPuGrP3tC","title":"lxd/lxc Group - Privilege escalation","pathname":"/linux-hardening/privilege-escalation/interesting-groups-linux-pe/lxd-privilege-escalation","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"},{"label":"Linux Privilege Escalation"},{"label":"Interesting Groups - Linux Privesc"}]},{"id":"Cx5KBvR6pVSGdAMQintS","title":"Logstash","pathname":"/linux-hardening/privilege-escalation/logstash","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"},{"label":"Linux Privilege Escalation"}]},{"id":"TCG08nEleFB7x0tpdZYq","title":"ld.so privesc exploit example","pathname":"/linux-hardening/privilege-escalation/ld.so.conf-example","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"},{"label":"Linux Privilege Escalation"}]},{"id":"vwkbw9fjwklhIqjHRNV4","title":"Linux Active Directory","pathname":"/linux-hardening/privilege-escalation/linux-active-directory","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"},{"label":"Linux Privilege Escalation"}]},{"id":"OHuzBhvUEH3MrP5cC9Ck","title":"Linux Capabilities","pathname":"/linux-hardening/privilege-escalation/linux-capabilities","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"},{"label":"Linux Privilege Escalation"}]},{"id":"6asxp4R2LXP6Dn4u8hv2","title":"NFS no_root_squash/no_all_squash misconfiguration PE","pathname":"/linux-hardening/privilege-escalation/nfs-no_root_squash-misconfiguration-pe","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"},{"label":"Linux Privilege Escalation"}]},{"id":"LECwiQnoMWfbRHcPzps4","title":"Node inspector/CEF debug abuse","pathname":"/linux-hardening/privilege-escalation/electron-cef-chromium-debugger-abuse","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"},{"label":"Linux Privilege Escalation"}]},{"id":"TQt4uaCX3pQm50XQP4iI","title":"Payloads to execute","pathname":"/linux-hardening/privilege-escalation/payloads-to-execute","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"},{"label":"Linux Privilege Escalation"}]},{"id":"Jn3I1Zw2t9enOzaDHExj","title":"RunC Privilege Escalation","pathname":"/linux-hardening/privilege-escalation/runc-privilege-escalation","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"},{"label":"Linux Privilege Escalation"}]},{"id":"msFeR5qQFl1uQvICMwl9","title":"SELinux","pathname":"/linux-hardening/privilege-escalation/selinux","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"},{"label":"Linux Privilege Escalation"}]},{"id":"KHlbUSZuNR63Rh1GZnLL","title":"Socket Command Injection","pathname":"/linux-hardening/privilege-escalation/socket-command-injection","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"},{"label":"Linux Privilege Escalation"}]},{"id":"yyrp2hI6AyBW3A7Z3ULm","title":"Splunk LPE and Persistence","pathname":"/linux-hardening/privilege-escalation/splunk-lpe-and-persistence","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"},{"label":"Linux Privilege Escalation"}]},{"id":"3Bn6zm5zKinsoeMXh7EL","title":"SSH Forward Agent exploitation","pathname":"/linux-hardening/privilege-escalation/ssh-forward-agent-exploitation","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"},{"label":"Linux Privilege Escalation"}]},{"id":"XZClkJQE9NSLyS6IdhcE","title":"Wildcards Spare tricks","pathname":"/linux-hardening/privilege-escalation/wildcards-spare-tricks","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"},{"label":"Linux Privilege Escalation"}]},{"id":"vS5zclrMIFaJpp2eKV1D","title":"Useful Linux Commands","pathname":"/linux-hardening/useful-linux-commands","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"}]},{"id":"NM6I2DQYZkFH5Z1Ojzjb","title":"Bypass Linux Restrictions","pathname":"/linux-hardening/bypass-bash-restrictions","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"}]},{"id":"Mx6eE1J0oDjvrTo6PnrJ","title":"Bypass FS protections: read-only / no-exec / Distroless","pathname":"/linux-hardening/bypass-bash-restrictions/bypass-fs-protections-read-only-no-exec-distroless","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"},{"label":"Bypass Linux Restrictions"}]},{"id":"D1llWKUBVML5iP2o3p7N","title":"DDexec / EverythingExec","pathname":"/linux-hardening/bypass-bash-restrictions/bypass-fs-protections-read-only-no-exec-distroless/ddexec","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"},{"label":"Bypass Linux Restrictions"},{"label":"Bypass FS protections: read-only / no-exec / Distroless"}]},{"id":"gbSBEmrQBxMcyoWxnSyn","title":"Linux Environment Variables","pathname":"/linux-hardening/linux-environment-variables","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"}]},{"id":"L3EYwYl9rJCfGXepRvja","title":"Linux Post-Exploitation","pathname":"/linux-hardening/linux-post-exploitation","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"}]},{"id":"J9rZ6QZVydjKCUPufBKv","title":"PAM - Pluggable Authentication Modules","pathname":"/linux-hardening/linux-post-exploitation/pam-pluggable-authentication-modules","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"},{"label":"Linux Post-Exploitation"}]},{"id":"AosVNLCzwSSpoZuE7Cs1","title":"FreeIPA Pentesting","pathname":"/linux-hardening/freeipa-pentesting","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Linux Hardening","emoji":"1f427"}]},{"id":"bTkvW6YFmQjgOT3l7dMN","title":"macOS Security & Privilege Escalation","pathname":"/macos-hardening/macos-security-and-privilege-escalation","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"}]},{"id":"XIDjbzVPyHDIpjy3lUol","title":"macOS Apps - Inspecting, debugging and Fuzzing","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-apps-inspecting-debugging-and-fuzzing","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"}]},{"id":"E38YkwMdBVtLWowNZ3W2","title":"Introduction to x64","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-apps-inspecting-debugging-and-fuzzing/introduction-to-x64","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"},{"label":"macOS Apps - Inspecting, debugging and Fuzzing"}]},{"id":"9xyQvIb3WYv4XpLvSgct","title":"Introduction to ARM64v8","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-apps-inspecting-debugging-and-fuzzing/arm64-basic-assembly","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"},{"label":"macOS Apps - Inspecting, debugging and Fuzzing"}]},{"id":"4ltnGpx3TcgiiiWWfTUl","title":"macOS AppleFS","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-applefs","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"}]},{"id":"fCu7Cdwj8fZmyytMiws8","title":"macOS Bypassing Firewalls","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-bypassing-firewalls","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"}]},{"id":"hnq57USrFNZKxX47esnK","title":"macOS Defensive Apps","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-defensive-apps","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"}]},{"id":"8dSTLrxoYCarUZhrM0qk","title":"macOS GCD - Grand Central Dispatch","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-gcd-grand-central-dispatch","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"}]},{"id":"4Y9E1Cma2KcwMcOXUjn4","title":"macOS Kernel & System Extensions","pathname":"/macos-hardening/macos-security-and-privilege-escalation/mac-os-architecture","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"}]},{"id":"WTAXEiS3RHFU5Eny6wwW","title":"macOS IOKit","pathname":"/macos-hardening/macos-security-and-privilege-escalation/mac-os-architecture/macos-iokit","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"},{"label":"macOS Kernel & System Extensions"}]},{"id":"8xdXzuflrFuv0sFDclfO","title":"macOS Kernel Extensions","pathname":"/macos-hardening/macos-security-and-privilege-escalation/mac-os-architecture/macos-kernel-extensions","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"},{"label":"macOS Kernel & System Extensions"}]},{"id":"sE0xifbO9LagraJFwMsN","title":"macOS Kernel Vulnerabilities","pathname":"/macos-hardening/macos-security-and-privilege-escalation/mac-os-architecture/macos-kernel-vulnerabilities","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"},{"label":"macOS Kernel & System Extensions"}]},{"id":"Cn1ld0J7LCalZafoCuWJ","title":"macOS System Extensions","pathname":"/macos-hardening/macos-security-and-privilege-escalation/mac-os-architecture/macos-system-extensions","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"},{"label":"macOS Kernel & System Extensions"}]},{"id":"r0OyCdvNXBvvFiQrjEh1","title":"macOS Network Services & Protocols","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-protocols","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"}]},{"id":"4EPDKbRGCXbsofASNxuY","title":"macOS File Extension & URL scheme app handlers","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-file-extension-apps","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"}]},{"id":"idkSjQRsmeD58xPE1Tqk","title":"macOS Files, Folders, Binaries & Memory","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-files-folders-and-binaries","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"}]},{"id":"8YGFLK4rhE1B3TqpfvCf","title":"macOS Bundles","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-files-folders-and-binaries/macos-bundles","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"},{"label":"macOS Files, Folders, Binaries & Memory"}]},{"id":"bqbwTZXE50gVWg2OzO9n","title":"macOS Installers Abuse","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-files-folders-and-binaries/macos-installers-abuse","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"},{"label":"macOS Files, Folders, Binaries & Memory"}]},{"id":"r8fQkVHeSjDFrUITs9Cg","title":"macOS Memory Dumping","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-files-folders-and-binaries/macos-memory-dumping","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"},{"label":"macOS Files, Folders, Binaries & Memory"}]},{"id":"ghTE17kUkLLCAZ8lTvNj","title":"macOS Sensitive Locations & Interesting Daemons","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-files-folders-and-binaries/macos-sensitive-locations","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"},{"label":"macOS Files, Folders, Binaries & Memory"}]},{"id":"OGANwWv4F9Ru9i75GntB","title":"macOS Universal binaries & Mach-O Format","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-files-folders-and-binaries/universal-binaries-and-mach-o-format","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"},{"label":"macOS Files, Folders, Binaries & Memory"}]},{"id":"7SkTm8amqdTmdjf0fYwW","title":"macOS Objective-C","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-basic-objective-c","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"}]},{"id":"bZFVbNzSFbtpsfu86riR","title":"macOS Privilege Escalation","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-privilege-escalation","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"}]},{"id":"z3IEUvrso9iNlcIUmwiI","title":"macOS Process Abuse","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-proces-abuse","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"}]},{"id":"c2zbPjMejOAzfvcq8mY8","title":"macOS Dirty NIB","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-proces-abuse/macos-dirty-nib","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"},{"label":"macOS Process Abuse"}]},{"id":"1LRI8iLjAT2wSDNf34Zn","title":"macOS Chromium Injection","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-proces-abuse/macos-chromium-injection","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"},{"label":"macOS Process Abuse"}]},{"id":"EBJ8PHMCqKz28YbYoun8","title":"macOS Electron Applications Injection","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-proces-abuse/macos-electron-applications-injection","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"},{"label":"macOS Process Abuse"}]},{"id":"u4V22DqKFMZhIPxjYwfP","title":"macOS Function Hooking","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-proces-abuse/macos-function-hooking","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"},{"label":"macOS Process Abuse"}]},{"id":"aGqVTHvmrR0AlHpXrDo2","title":"macOS IPC - Inter Process Communication","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-proces-abuse/macos-ipc-inter-process-communication","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"},{"label":"macOS Process Abuse"}]},{"id":"kZhqKxrxdFY2V7LOKjIt","title":"macOS MIG - Mach Interface Generator","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-proces-abuse/macos-ipc-inter-process-communication/macos-mig-mach-interface-generator","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"},{"label":"macOS Process Abuse"},{"label":"macOS IPC - Inter Process Communication"}]},{"id":"jQal7GagiGIJILhZSEjO","title":"macOS XPC","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-proces-abuse/macos-ipc-inter-process-communication/macos-xpc","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"},{"label":"macOS Process Abuse"},{"label":"macOS IPC - Inter Process Communication"}]},{"id":"Gbp9ynDXjcsfMc0KdUqb","title":"macOS XPC Authorization","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-proces-abuse/macos-ipc-inter-process-communication/macos-xpc/macos-xpc-authorization","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"},{"label":"macOS Process Abuse"},{"label":"macOS IPC - Inter Process Communication"},{"label":"macOS XPC"}]},{"id":"5iRKBBuNZiRWxJzeRbEm","title":"macOS XPC Connecting Process Check","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-proces-abuse/macos-ipc-inter-process-communication/macos-xpc/macos-xpc-connecting-process-check","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"},{"label":"macOS Process Abuse"},{"label":"macOS IPC - Inter Process Communication"},{"label":"macOS XPC"}]},{"id":"IBBvGebeopESc39o1cad","title":"macOS PID Reuse","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-proces-abuse/macos-ipc-inter-process-communication/macos-xpc/macos-xpc-connecting-process-check/macos-pid-reuse","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"},{"label":"macOS Process Abuse"},{"label":"macOS IPC - Inter Process Communication"},{"label":"macOS XPC"},{"label":"macOS XPC Connecting Process Check"}]},{"id":"5C4De9MbQ0R8bQ0OZQ2F","title":"macOS xpc_connection_get_audit_token Attack","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-proces-abuse/macos-ipc-inter-process-communication/macos-xpc/macos-xpc-connecting-process-check/macos-xpc_connection_get_audit_token-attack","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"},{"label":"macOS Process Abuse"},{"label":"macOS IPC - Inter Process Communication"},{"label":"macOS XPC"},{"label":"macOS XPC Connecting Process Check"}]},{"id":"91My75p7sJkuUcRj8rlU","title":"macOS Thread Injection via Task port","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-proces-abuse/macos-ipc-inter-process-communication/macos-thread-injection-via-task-port","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"},{"label":"macOS Process Abuse"},{"label":"macOS IPC - Inter Process Communication"}]},{"id":"KrbdmQ6hqbXuqM35MJX9","title":"macOS Java Applications Injection","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-proces-abuse/macos-java-apps-injection","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"},{"label":"macOS Process Abuse"}]},{"id":"7YWf3A3P8fbd3KWxMIxy","title":"macOS Library Injection","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-proces-abuse/macos-library-injection","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"},{"label":"macOS Process Abuse"}]},{"id":"pZInjEWZvn9cyokqT8yC","title":"macOS Dyld Hijacking & DYLD_INSERT_LIBRARIES","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-proces-abuse/macos-library-injection/macos-dyld-hijacking-and-dyld_insert_libraries","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"},{"label":"macOS Process Abuse"},{"label":"macOS Library Injection"}]},{"id":"YrzvdwuN9R0bN3JXjtiB","title":"macOS Dyld Process","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-proces-abuse/macos-library-injection/macos-dyld-process","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"},{"label":"macOS Process Abuse"},{"label":"macOS Library Injection"}]},{"id":"RLj24Zd7A7l27BusGR5V","title":"macOS Perl Applications Injection","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-proces-abuse/macos-perl-applications-injection","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"},{"label":"macOS Process Abuse"}]},{"id":"byUkGFDJPIhlm7QPmoUK","title":"macOS Python Applications Injection","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-proces-abuse/macos-python-applications-injection","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"},{"label":"macOS Process Abuse"}]},{"id":"NiivrQ6pVou9W3WdY2fs","title":"macOS Ruby Applications Injection","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-proces-abuse/macos-ruby-applications-injection","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"},{"label":"macOS Process Abuse"}]},{"id":"qw6SN4mbNflO5ms4hohS","title":"macOS .Net Applications Injection","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-proces-abuse/macos-.net-applications-injection","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"},{"label":"macOS Process Abuse"}]},{"id":"8ZPvsGgWCNVkdPY4pU0E","title":"macOS Security Protections","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-security-protections","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"}]},{"id":"ZW8E29vB2gR79t8ykKQ8","title":"macOS Gatekeeper / Quarantine / XProtect","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-security-protections/macos-gatekeeper","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"},{"label":"macOS Security Protections"}]},{"id":"0qbPl5J9Sq4LklH53VpH","title":"macOS Launch/Environment Constraints & Trust Cache","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-security-protections/macos-launch-environment-constraints","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"},{"label":"macOS Security Protections"}]},{"id":"W7awQ6IReFOhuTDQwbEj","title":"macOS Sandbox","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-security-protections/macos-sandbox","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"},{"label":"macOS Security Protections"}]},{"id":"grDgtvGZvvvy5pWJD8Q3","title":"macOS Default Sandbox Debug","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-security-protections/macos-sandbox/macos-default-sandbox-debug","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"},{"label":"macOS Security Protections"},{"label":"macOS Sandbox"}]},{"id":"OOmPlccZ0yfPCAxqCBF1","title":"macOS Sandbox Debug & Bypass","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-security-protections/macos-sandbox/macos-sandbox-debug-and-bypass","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"},{"label":"macOS Security Protections"},{"label":"macOS Sandbox"}]},{"id":"Oe6rrPxrpQeFuU5X7Z9n","title":"macOS Office Sandbox Bypasses","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-security-protections/macos-sandbox/macos-sandbox-debug-and-bypass/macos-office-sandbox-bypasses","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"},{"label":"macOS Security Protections"},{"label":"macOS Sandbox"},{"label":"macOS Sandbox Debug & Bypass"}]},{"id":"LcuZBivHr8OVZjw1ItpM","title":"macOS SIP","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-security-protections/macos-sip","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"},{"label":"macOS Security Protections"}]},{"id":"VCLBOAH8WCd6s7upjxax","title":"macOS TCC","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-security-protections/macos-tcc","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"},{"label":"macOS Security Protections"}]},{"id":"lawMYYWXOV1YIO3uBQ1t","title":"macOS Apple Events","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-security-protections/macos-tcc/macos-apple-events","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"},{"label":"macOS Security Protections"},{"label":"macOS TCC"}]},{"id":"XelwkmWcQDHIThQjD8pQ","title":"macOS TCC Bypasses","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-security-protections/macos-tcc/macos-tcc-bypasses","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"},{"label":"macOS Security Protections"},{"label":"macOS TCC"}]},{"id":"wC8ZbfL1auAg7wpRytIH","title":"macOS Apple Scripts","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-security-protections/macos-tcc/macos-tcc-bypasses/macos-apple-scripts","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"},{"label":"macOS Security Protections"},{"label":"macOS TCC"},{"label":"macOS TCC Bypasses"}]},{"id":"qaHNex9bJWEGIloNd2Mi","title":"macOS TCC Payloads","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-security-protections/macos-tcc/macos-tcc-payloads","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"},{"label":"macOS Security Protections"},{"label":"macOS TCC"}]},{"id":"t8nN1oKrfZgGb8MwcKjU","title":"macOS Dangerous Entitlements & TCC perms","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-security-protections/macos-dangerous-entitlements","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"},{"label":"macOS Security Protections"}]},{"id":"dkiqDUvW0efwESWLdDFg","title":"macOS FS Tricks","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-security-protections/macos-fs-tricks","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"},{"label":"macOS Security Protections"}]},{"id":"0JdoRY9DgPp0xgnSYYs2","title":"macOS xattr-acls extra stuff","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-security-protections/macos-fs-tricks/macos-xattr-acls-extra-stuff","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"},{"label":"macOS Security Protections"},{"label":"macOS FS Tricks"}]},{"id":"NNN5MZJdjvevhxfrupfl","title":"macOS Users","pathname":"/macos-hardening/macos-security-and-privilege-escalation/macos-users","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Security & Privilege Escalation"}]},{"id":"tqRZTBKIM09Gdg2s0uFr","title":"macOS Red Teaming","pathname":"/macos-hardening/macos-red-teaming","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"}]},{"id":"7ZHAgK6caW6ca21dN5Rs","title":"macOS MDM","pathname":"/macos-hardening/macos-red-teaming/macos-mdm","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Red Teaming"}]},{"id":"ox3ZNq0yvycg6ePhUHxA","title":"Enrolling Devices in Other Organisations","pathname":"/macos-hardening/macos-red-teaming/macos-mdm/enrolling-devices-in-other-organisations","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Red Teaming"},{"label":"macOS MDM"}]},{"id":"N17zzIxe6UxVLtF7XhRx","title":"macOS Serial Number","pathname":"/macos-hardening/macos-red-teaming/macos-mdm/macos-serial-number","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Red Teaming"},{"label":"macOS MDM"}]},{"id":"f0U1gFDi3h0zVneQHeNi","title":"macOS Keychain","pathname":"/macos-hardening/macos-red-teaming/macos-keychain","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"},{"label":"macOS Red Teaming"}]},{"id":"yV8WXbLTuj5JIYaRZiua","title":"macOS Useful Commands","pathname":"/macos-hardening/macos-useful-commands","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"}]},{"id":"5q1NlsgKHUQqN42lRQ8S","title":"macOS Auto Start","pathname":"/macos-hardening/macos-auto-start-locations","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"MacOS Hardening","emoji":"1f34f"}]},{"id":"Qs4o411W4wyRBt7tzFtL","title":"Checklist - Local Windows Privilege Escalation","pathname":"/windows-hardening/checklist-windows-privilege-escalation","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"}]},{"id":"flWGSMTybKsUJLqsox9H","title":"Windows Local Privilege Escalation","pathname":"/windows-hardening/windows-local-privilege-escalation","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"}]},{"id":"SQWeAkC9RifQDzhhAYzq","title":"Abusing Tokens","pathname":"/windows-hardening/windows-local-privilege-escalation/privilege-escalation-abusing-tokens","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Windows Local Privilege Escalation"}]},{"id":"rwmQJKUFDuRVpj0r64iJ","title":"Access Tokens","pathname":"/windows-hardening/windows-local-privilege-escalation/access-tokens","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Windows Local Privilege Escalation"}]},{"id":"37SrCdsbh9LllogUYSws","title":"ACLs - DACLs/SACLs/ACEs","pathname":"/windows-hardening/windows-local-privilege-escalation/acls-dacls-sacls-aces","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Windows Local Privilege Escalation"}]},{"id":"uPuW5WFe9abqdvaLPA06","title":"AppendData/AddSubdirectory permission over service registry","pathname":"/windows-hardening/windows-local-privilege-escalation/appenddata-addsubdirectory-permission-over-service-registry","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Windows Local Privilege Escalation"}]},{"id":"3AUOv5Sck5shTLjGxqAH","title":"Create MSI with WIX","pathname":"/windows-hardening/windows-local-privilege-escalation/create-msi-with-wix","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Windows Local Privilege Escalation"}]},{"id":"AAnRX9hoPRLigKV3AB6N","title":"COM Hijacking","pathname":"/windows-hardening/windows-local-privilege-escalation/com-hijacking","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Windows Local Privilege Escalation"}]},{"id":"PIyHTIv1Ecs81mMZ8KfT","title":"Dll Hijacking","pathname":"/windows-hardening/windows-local-privilege-escalation/dll-hijacking","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Windows Local Privilege Escalation"}]},{"id":"5oj0l0f3ZDI8Ior8SkjQ","title":"Writable Sys Path +Dll Hijacking Privesc","pathname":"/windows-hardening/windows-local-privilege-escalation/dll-hijacking/writable-sys-path-+dll-hijacking-privesc","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Windows Local Privilege Escalation"},{"label":"Dll Hijacking"}]},{"id":"LajGmIDfWFOhUUpFtYEE","title":"DPAPI - Extracting Passwords","pathname":"/windows-hardening/windows-local-privilege-escalation/dpapi-extracting-passwords","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Windows Local Privilege Escalation"}]},{"id":"SS8revbDlhCWqVynwAKB","title":"From High Integrity to SYSTEM with Name Pipes","pathname":"/windows-hardening/windows-local-privilege-escalation/from-high-integrity-to-system-with-name-pipes","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Windows Local Privilege Escalation"}]},{"id":"WuEYQFUAACKzZLOz3g3g","title":"Integrity Levels","pathname":"/windows-hardening/windows-local-privilege-escalation/integrity-levels","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Windows Local Privilege Escalation"}]},{"id":"YjUIsM29Lk8y0u3MfPHc","title":"JuicyPotato","pathname":"/windows-hardening/windows-local-privilege-escalation/juicypotato","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Windows Local Privilege Escalation"}]},{"id":"x0uPGv1OY9BF7C36oPaa","title":"Leaked Handle Exploitation","pathname":"/windows-hardening/windows-local-privilege-escalation/leaked-handle-exploitation","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Windows Local Privilege Escalation"}]},{"id":"UwGP53cEn9hIYJMEIIrO","title":"MSI Wrapper","pathname":"/windows-hardening/windows-local-privilege-escalation/msi-wrapper","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Windows Local Privilege Escalation"}]},{"id":"AUkwGViVyr0hzatC5Ml8","title":"Named Pipe Client Impersonation","pathname":"/windows-hardening/windows-local-privilege-escalation/named-pipe-client-impersonation","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Windows Local Privilege Escalation"}]},{"id":"H5pih7I7IcjI0sfTmRnp","title":"Privilege Escalation with Autoruns","pathname":"/windows-hardening/windows-local-privilege-escalation/privilege-escalation-with-autorun-binaries","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Windows Local Privilege Escalation"}]},{"id":"UluVSSCPbTdOK3sWcuzj","title":"RoguePotato, PrintSpoofer, SharpEfsPotato, GodPotato","pathname":"/windows-hardening/windows-local-privilege-escalation/roguepotato-and-printspoofer","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Windows Local Privilege Escalation"}]},{"id":"CTSW4zF2VjsoChSTtGto","title":"SeDebug + SeImpersonate copy token","pathname":"/windows-hardening/windows-local-privilege-escalation/sedebug-+-seimpersonate-copy-token","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Windows Local Privilege Escalation"}]},{"id":"xb3memY4PHjx0n31w3Q9","title":"SeImpersonate from High To System","pathname":"/windows-hardening/windows-local-privilege-escalation/seimpersonate-from-high-to-system","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Windows Local Privilege Escalation"}]},{"id":"pY1gifxA2DZq87Mapf6e","title":"Windows C Payloads","pathname":"/windows-hardening/windows-local-privilege-escalation/windows-c-payloads","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Windows Local Privilege Escalation"}]},{"id":"cbFbPrgJEQ0DFqIcUSTV","title":"Active Directory Methodology","pathname":"/windows-hardening/active-directory-methodology","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"}]},{"id":"GXzxWkPYzekNjH0HQhud","title":"Abusing Active Directory ACLs/ACEs","pathname":"/windows-hardening/active-directory-methodology/acl-persistence-abuse","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Active Directory Methodology"}]},{"id":"veWc9l0vRqjfoLatdu85","title":"Shadow Credentials","pathname":"/windows-hardening/active-directory-methodology/acl-persistence-abuse/shadow-credentials","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Active Directory Methodology"},{"label":"Abusing Active Directory ACLs/ACEs"}]},{"id":"GyBhxHxMi3zCz8V3xdRl","title":"AD Certificates","pathname":"/windows-hardening/active-directory-methodology/ad-certificates","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Active Directory Methodology"}]},{"id":"nXciCmmbz7EehGn1zv1D","title":"AD CS Account Persistence","pathname":"/windows-hardening/active-directory-methodology/ad-certificates/account-persistence","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Active Directory Methodology"},{"label":"AD Certificates"}]},{"id":"a1NlyFMlQ4x3nWWbC8E9","title":"AD CS Domain Escalation","pathname":"/windows-hardening/active-directory-methodology/ad-certificates/domain-escalation","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Active Directory Methodology"},{"label":"AD Certificates"}]},{"id":"c62OtLKlEw5jFNVyOplh","title":"AD CS Domain Persistence","pathname":"/windows-hardening/active-directory-methodology/ad-certificates/domain-persistence","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Active Directory Methodology"},{"label":"AD Certificates"}]},{"id":"CEXzB3jqs1zCd0RJIiLo","title":"AD CS Certificate Theft","pathname":"/windows-hardening/active-directory-methodology/ad-certificates/certificate-theft","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Active Directory Methodology"},{"label":"AD Certificates"}]},{"id":"kH72kkNeyhNnVAYPCyP8","title":"AD information in printers","pathname":"/windows-hardening/active-directory-methodology/ad-information-in-printers","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Active Directory Methodology"}]},{"id":"2NECWL0QXXMUAqvCdVRB","title":"AD DNS Records","pathname":"/windows-hardening/active-directory-methodology/ad-dns-records","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Active Directory Methodology"}]},{"id":"7dGyb5k2Um0a0Qs2U1pr","title":"ASREPRoast","pathname":"/windows-hardening/active-directory-methodology/asreproast","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Active Directory Methodology"}]},{"id":"VuuU9lhhSP0imgE8qYrC","title":"BloodHound & Other AD Enum Tools","pathname":"/windows-hardening/active-directory-methodology/bloodhound","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Active Directory Methodology"}]},{"id":"SbJmaRyyuSrVjLHbTr6h","title":"Constrained Delegation","pathname":"/windows-hardening/active-directory-methodology/constrained-delegation","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Active Directory Methodology"}]},{"id":"eTUkzX3B8kfFeIJ2qo1c","title":"Custom SSP","pathname":"/windows-hardening/active-directory-methodology/custom-ssp","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Active Directory Methodology"}]},{"id":"kPoawuUj6vgF0H3ilfrz","title":"DCShadow","pathname":"/windows-hardening/active-directory-methodology/dcshadow","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Active Directory Methodology"}]},{"id":"pWeCZrLMMQQYjHdGzHq1","title":"DCSync","pathname":"/windows-hardening/active-directory-methodology/dcsync","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Active Directory Methodology"}]},{"id":"eyB8I25d3z7UOs8cHHUh","title":"Diamond Ticket","pathname":"/windows-hardening/active-directory-methodology/diamond-ticket","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Active Directory Methodology"}]},{"id":"DFTVxLd66rE7dVGlFbID","title":"DSRM Credentials","pathname":"/windows-hardening/active-directory-methodology/dsrm-credentials","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Active Directory Methodology"}]},{"id":"MamE7QooPChiYyzbAZW9","title":"External Forest Domain - OneWay (Inbound) or bidirectional","pathname":"/windows-hardening/active-directory-methodology/external-forest-domain-oneway-inbound","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Active Directory Methodology"}]},{"id":"qTAjSrIzmuBJZG9kmVMY","title":"External Forest Domain - One-Way (Outbound)","pathname":"/windows-hardening/active-directory-methodology/external-forest-domain-one-way-outbound","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Active Directory Methodology"}]},{"id":"fiKIcT0BnLtB2EMyfMK4","title":"Golden Ticket","pathname":"/windows-hardening/active-directory-methodology/golden-ticket","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Active Directory Methodology"}]},{"id":"TZczVOmbzu0a9041PRQr","title":"Kerberoast","pathname":"/windows-hardening/active-directory-methodology/kerberoast","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Active Directory Methodology"}]},{"id":"FxAurlIXs2vlVTgir630","title":"Kerberos Authentication","pathname":"/windows-hardening/active-directory-methodology/kerberos-authentication","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Active Directory Methodology"}]},{"id":"tNbcxFyXuXRkxahexeCv","title":"Kerberos Double Hop Problem","pathname":"/windows-hardening/active-directory-methodology/kerberos-double-hop-problem","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Active Directory Methodology"}]},{"id":"iAsWMoVhP1GFYk1mLLfZ","title":"LAPS","pathname":"/windows-hardening/active-directory-methodology/laps","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Active Directory Methodology"}]},{"id":"a89HyHuuNb76uxaw9ktx","title":"MSSQL AD Abuse","pathname":"/windows-hardening/active-directory-methodology/abusing-ad-mssql","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Active Directory Methodology"}]},{"id":"JSPdBH8j1ZY3YoSpQLiZ","title":"Over Pass the Hash/Pass the Key","pathname":"/windows-hardening/active-directory-methodology/over-pass-the-hash-pass-the-key","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Active Directory Methodology"}]},{"id":"tcD0fedELdjYaS6R7L9v","title":"Pass the Ticket","pathname":"/windows-hardening/active-directory-methodology/pass-the-ticket","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Active Directory Methodology"}]},{"id":"ykcJ2EAzAUfPAxBL4LaM","title":"Password Spraying / Brute Force","pathname":"/windows-hardening/active-directory-methodology/password-spraying","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Active Directory Methodology"}]},{"id":"fC1xmR84vgsv4OLgcMfQ","title":"PrintNightmare","pathname":"/windows-hardening/active-directory-methodology/printnightmare","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Active Directory Methodology"}]},{"id":"4DFfuVV4quMkp6CjmxLf","title":"Force NTLM Privileged Authentication","pathname":"/windows-hardening/active-directory-methodology/printers-spooler-service-abuse","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Active Directory Methodology"}]},{"id":"Bg86SoPtqCkAccGnhBbC","title":"Privileged Groups","pathname":"/windows-hardening/active-directory-methodology/privileged-groups-and-token-privileges","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Active Directory Methodology"}]},{"id":"Ia4g1pcODtaE1XlEqf7v","title":"RDP Sessions Abuse","pathname":"/windows-hardening/active-directory-methodology/rdp-sessions-abuse","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Active Directory Methodology"}]},{"id":"oJQX9EhCBzGAMTbVEoTG","title":"Resource-based Constrained Delegation","pathname":"/windows-hardening/active-directory-methodology/resource-based-constrained-delegation","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Active Directory Methodology"}]},{"id":"AZneh3LabvOfaMbGBpBL","title":"Security Descriptors","pathname":"/windows-hardening/active-directory-methodology/security-descriptors","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Active Directory Methodology"}]},{"id":"b10nB3D3fkVRcZMpYKse","title":"SID-History Injection","pathname":"/windows-hardening/active-directory-methodology/sid-history-injection","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Active Directory Methodology"}]},{"id":"bfqobOhdkgShq3F0u2l8","title":"Silver Ticket","pathname":"/windows-hardening/active-directory-methodology/silver-ticket","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Active Directory Methodology"}]},{"id":"1kn01VRovBclWtxaM8SK","title":"Skeleton Key","pathname":"/windows-hardening/active-directory-methodology/skeleton-key","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Active Directory Methodology"}]},{"id":"WaKbQnfYAcDOzh2fuelr","title":"Unconstrained Delegation","pathname":"/windows-hardening/active-directory-methodology/unconstrained-delegation","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Active Directory Methodology"}]},{"id":"UtpJeBSjbeAKd4hskBTj","title":"Windows Security Controls","pathname":"/windows-hardening/authentication-credentials-uac-and-efs","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"}]},{"id":"uSbrA38MqcBC0a2oKU0d","title":"UAC - User Account Control","pathname":"/windows-hardening/authentication-credentials-uac-and-efs/uac-user-account-control","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Windows Security Controls"}]},{"id":"uyxMj4sLFXEg8ue8TAz1","title":"NTLM","pathname":"/windows-hardening/ntlm","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"}]},{"id":"tYuogQbto0lALiUzuFX1","title":"Places to steal NTLM creds","pathname":"/windows-hardening/ntlm/places-to-steal-ntlm-creds","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"NTLM"}]},{"id":"rW7y3sHwa0xesJkwwEdF","title":"Lateral Movement","pathname":"/windows-hardening/lateral-movement","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"}]},{"id":"bjeNgTaRD6skt8HmewzC","title":"AtExec / SchtasksExec","pathname":"/windows-hardening/lateral-movement/atexec","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Lateral Movement"}]},{"id":"9zD6tEgC8926EKFHE2el","title":"DCOM Exec","pathname":"/windows-hardening/lateral-movement/dcom-exec","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Lateral Movement"}]},{"id":"tgq1MtSIpj1HHhD5aTv4","title":"PsExec/Winexec/ScExec","pathname":"/windows-hardening/lateral-movement/psexec-and-winexec","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Lateral Movement"}]},{"id":"YJ7CSwCLS3kuuyNFrHJU","title":"SmbExec/ScExec","pathname":"/windows-hardening/lateral-movement/smbexec","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Lateral Movement"}]},{"id":"k195eqWHNLyDTeh32Lv8","title":"WinRM","pathname":"/windows-hardening/lateral-movement/winrm","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Lateral Movement"}]},{"id":"Zv2UZxDuIqSoy3UVtVUu","title":"WmicExec","pathname":"/windows-hardening/lateral-movement/wmicexec","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Lateral Movement"}]},{"id":"yXB42LmSO5A4Ug77s58r","title":"Stealing Windows Credentials","pathname":"/windows-hardening/stealing-credentials","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"}]},{"id":"cJ1fdtgI4axAM56dhUDH","title":"Windows Credentials Protections","pathname":"/windows-hardening/stealing-credentials/credentials-protections","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Stealing Windows Credentials"}]},{"id":"tsgHED0iFywpUEoPCALl","title":"Mimikatz","pathname":"/windows-hardening/stealing-credentials/credentials-mimikatz","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Stealing Windows Credentials"}]},{"id":"mcroCR4mXxmxqoJjADHl","title":"WTS Impersonator","pathname":"/windows-hardening/stealing-credentials/wts-impersonator","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Stealing Windows Credentials"}]},{"id":"m8JhELUqRwxCoOy3nxtW","title":"Basic Win CMD for Pentesters","pathname":"/windows-hardening/basic-cmd-for-pentesters","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"}]},{"id":"PivMMIwUkr4wzUdXK1mK","title":"Basic PowerShell for Pentesters","pathname":"/windows-hardening/basic-powershell-for-pentesters","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"}]},{"id":"R2GUO83JDKiTw6297mbp","title":"PowerView/SharpView","pathname":"/windows-hardening/basic-powershell-for-pentesters/powerview","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"},{"label":"Basic PowerShell for Pentesters"}]},{"id":"INsRKuxf1tybaw4X0Qwj","title":"Antivirus (AV) Bypass","pathname":"/windows-hardening/av-bypass","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Windows Hardening","emoji":"1fa9f"}]},{"id":"Kl76ZMmdTpLT9pBanN5G","title":"Android APK Checklist","pathname":"/mobile-pentesting/android-checklist","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Mobile Pentesting","emoji":"1f4f1"}]},{"id":"o1AaqUa2qvi6wPRx6x4I","title":"Android Applications Pentesting","pathname":"/mobile-pentesting/android-app-pentesting","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Mobile Pentesting","emoji":"1f4f1"}]},{"id":"oKUSzm697jnfROFKoC2F","title":"Android Applications Basics","pathname":"/mobile-pentesting/android-app-pentesting/android-applications-basics","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Mobile Pentesting","emoji":"1f4f1"},{"label":"Android Applications Pentesting"}]},{"id":"QBPsUvRoG95Idz2RJ00G","title":"Android Task Hijacking","pathname":"/mobile-pentesting/android-app-pentesting/android-task-hijacking","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Mobile Pentesting","emoji":"1f4f1"},{"label":"Android Applications Pentesting"}]},{"id":"kWjH9REYRUJuNYS8Bn85","title":"ADB Commands","pathname":"/mobile-pentesting/android-app-pentesting/adb-commands","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Mobile Pentesting","emoji":"1f4f1"},{"label":"Android Applications Pentesting"}]},{"id":"QjY8AZDfKJJvWcobKmUn","title":"APK decompilers","pathname":"/mobile-pentesting/android-app-pentesting/apk-decompilers","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Mobile Pentesting","emoji":"1f4f1"},{"label":"Android Applications Pentesting"}]},{"id":"bfZJANiyGgbLxPwL0q6g","title":"AVD - Android Virtual Device","pathname":"/mobile-pentesting/android-app-pentesting/avd-android-virtual-device","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Mobile Pentesting","emoji":"1f4f1"},{"label":"Android Applications Pentesting"}]},{"id":"0ZAkpE6Q8SaPT85COOrS","title":"Bypass Biometric Authentication (Android)","pathname":"/mobile-pentesting/android-app-pentesting/bypass-biometric-authentication-android","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Mobile Pentesting","emoji":"1f4f1"},{"label":"Android Applications Pentesting"}]},{"id":"PbcesPOl963r9Js6rFNt","title":"content:// protocol","pathname":"/mobile-pentesting/android-app-pentesting/content-protocol","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Mobile Pentesting","emoji":"1f4f1"},{"label":"Android Applications Pentesting"}]},{"id":"BEtpmNCF6xpKOwNzZFSG","title":"Drozer Tutorial","pathname":"/mobile-pentesting/android-app-pentesting/drozer-tutorial","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Mobile Pentesting","emoji":"1f4f1"},{"label":"Android Applications Pentesting"}]},{"id":"HEUJA6iYPQaNpl3Ua49F","title":"Exploiting Content Providers","pathname":"/mobile-pentesting/android-app-pentesting/drozer-tutorial/exploiting-content-providers","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Mobile Pentesting","emoji":"1f4f1"},{"label":"Android Applications Pentesting"},{"label":"Drozer Tutorial"}]},{"id":"30dOrp7vgjNHFhTWl12i","title":"Exploiting a debuggeable application","pathname":"/mobile-pentesting/android-app-pentesting/exploiting-a-debuggeable-applciation","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Mobile Pentesting","emoji":"1f4f1"},{"label":"Android Applications Pentesting"}]},{"id":"IvNEMKEDSLvjR5qftBUM","title":"Frida Tutorial","pathname":"/mobile-pentesting/android-app-pentesting/frida-tutorial","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Mobile Pentesting","emoji":"1f4f1"},{"label":"Android Applications Pentesting"}]},{"id":"biIaAOZ7smw02uvohjQW","title":"Frida Tutorial 1","pathname":"/mobile-pentesting/android-app-pentesting/frida-tutorial/frida-tutorial-1","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Mobile Pentesting","emoji":"1f4f1"},{"label":"Android Applications Pentesting"},{"label":"Frida Tutorial"}]},{"id":"nbP39zfsU1FI6MPlaahD","title":"Frida Tutorial 2","pathname":"/mobile-pentesting/android-app-pentesting/frida-tutorial/frida-tutorial-2","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Mobile Pentesting","emoji":"1f4f1"},{"label":"Android Applications Pentesting"},{"label":"Frida Tutorial"}]},{"id":"FfgoHnWmaChGsqmOrBHQ","title":"Frida Tutorial 3","pathname":"/mobile-pentesting/android-app-pentesting/frida-tutorial/owaspuncrackable-1","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Mobile Pentesting","emoji":"1f4f1"},{"label":"Android Applications Pentesting"},{"label":"Frida Tutorial"}]},{"id":"gLfhJJrUB8fesBeFc8fU","title":"Objection Tutorial","pathname":"/mobile-pentesting/android-app-pentesting/frida-tutorial/objection-tutorial","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Mobile Pentesting","emoji":"1f4f1"},{"label":"Android Applications Pentesting"},{"label":"Frida Tutorial"}]},{"id":"KY0qU6VY5ZBWnHO2HDoV","title":"Google CTF 2018 - Shall We Play a Game?","pathname":"/mobile-pentesting/android-app-pentesting/google-ctf-2018-shall-we-play-a-game","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Mobile Pentesting","emoji":"1f4f1"},{"label":"Android Applications Pentesting"}]},{"id":"T86gZsYdzBCNnr9vdTYD","title":"Install Burp Certificate","pathname":"/mobile-pentesting/android-app-pentesting/install-burp-certificate","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Mobile Pentesting","emoji":"1f4f1"},{"label":"Android Applications Pentesting"}]},{"id":"N0mfgvM2ACN5XQZglwJT","title":"Intent Injection","pathname":"/mobile-pentesting/android-app-pentesting/intent-injection","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Mobile Pentesting","emoji":"1f4f1"},{"label":"Android Applications Pentesting"}]},{"id":"o22RJaYijY6fCx3GRpPG","title":"Make APK Accept CA Certificate","pathname":"/mobile-pentesting/android-app-pentesting/make-apk-accept-ca-certificate","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Mobile Pentesting","emoji":"1f4f1"},{"label":"Android Applications Pentesting"}]},{"id":"rjtXHsv6V1AwTKtwTS61","title":"Manual DeObfuscation","pathname":"/mobile-pentesting/android-app-pentesting/manual-deobfuscation","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Mobile Pentesting","emoji":"1f4f1"},{"label":"Android Applications Pentesting"}]},{"id":"GIYGXmqQbiLvWgr4RwVs","title":"React Native Application","pathname":"/mobile-pentesting/android-app-pentesting/react-native-application","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Mobile Pentesting","emoji":"1f4f1"},{"label":"Android Applications Pentesting"}]},{"id":"WIBSQP5CCkffgVRj4g7b","title":"Reversing Native Libraries","pathname":"/mobile-pentesting/android-app-pentesting/reversing-native-libraries","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Mobile Pentesting","emoji":"1f4f1"},{"label":"Android Applications Pentesting"}]},{"id":"uijqMJXn1cLzxUUa9CCG","title":"Smali - Decompiling/[Modifying]/Compiling","pathname":"/mobile-pentesting/android-app-pentesting/smali-changes","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Mobile Pentesting","emoji":"1f4f1"},{"label":"Android Applications Pentesting"}]},{"id":"q40XwFptwwy98RjFldYs","title":"Spoofing your location in Play Store","pathname":"/mobile-pentesting/android-app-pentesting/spoofing-your-location-in-play-store","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Mobile Pentesting","emoji":"1f4f1"},{"label":"Android Applications Pentesting"}]},{"id":"s9CVnSv9PCKQ1jr13CjL","title":"Tapjacking","pathname":"/mobile-pentesting/android-app-pentesting/tapjacking","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Mobile Pentesting","emoji":"1f4f1"},{"label":"Android Applications Pentesting"}]},{"id":"8KBPKUFzBDDpBk6Rdkgp","title":"Webview Attacks","pathname":"/mobile-pentesting/android-app-pentesting/webview-attacks","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Mobile Pentesting","emoji":"1f4f1"},{"label":"Android Applications Pentesting"}]},{"id":"0uTk6aomPvHzW9mKfjlE","title":"iOS Pentesting Checklist","pathname":"/mobile-pentesting/ios-pentesting-checklist","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Mobile Pentesting","emoji":"1f4f1"}]},{"id":"2GN0JbTt8O3uTP0W9ydy","title":"iOS Pentesting","pathname":"/mobile-pentesting/ios-pentesting","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Mobile Pentesting","emoji":"1f4f1"}]},{"id":"5XuHN1Y63P6Psi87SxRh","title":"iOS App Extensions","pathname":"/mobile-pentesting/ios-pentesting/ios-app-extensions","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Mobile Pentesting","emoji":"1f4f1"},{"label":"iOS Pentesting"}]},{"id":"97VovUmD9cUheSOG3py2","title":"iOS Basics","pathname":"/mobile-pentesting/ios-pentesting/ios-basics","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Mobile Pentesting","emoji":"1f4f1"},{"label":"iOS Pentesting"}]},{"id":"tnir9Zy4zwf5ShrJxleH","title":"iOS Basic Testing Operations","pathname":"/mobile-pentesting/ios-pentesting/basic-ios-testing-operations","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Mobile Pentesting","emoji":"1f4f1"},{"label":"iOS Pentesting"}]},{"id":"B2toYEhFXSKJBbZV5UkR","title":"iOS Burp Suite Configuration","pathname":"/mobile-pentesting/ios-pentesting/burp-configuration-for-ios","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Mobile Pentesting","emoji":"1f4f1"},{"label":"iOS Pentesting"}]},{"id":"QaLuPiDuE7uaywizanOb","title":"iOS Custom URI Handlers / Deeplinks / Custom Schemes","pathname":"/mobile-pentesting/ios-pentesting/ios-custom-uri-handlers-deeplinks-custom-schemes","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Mobile Pentesting","emoji":"1f4f1"},{"label":"iOS Pentesting"}]},{"id":"dGwviPLZOIEP65AMFQql","title":"iOS Extracting Entitlements From Compiled Application","pathname":"/mobile-pentesting/ios-pentesting/extracting-entitlements-from-compiled-application","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Mobile Pentesting","emoji":"1f4f1"},{"label":"iOS Pentesting"}]},{"id":"6DZYx4nz5B0Tfd1NMjPj","title":"iOS Frida Configuration","pathname":"/mobile-pentesting/ios-pentesting/frida-configuration-in-ios","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Mobile Pentesting","emoji":"1f4f1"},{"label":"iOS Pentesting"}]},{"id":"240R8ZbyY06GbjNgJoRj","title":"iOS Hooking With Objection","pathname":"/mobile-pentesting/ios-pentesting/ios-hooking-with-objection","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Mobile Pentesting","emoji":"1f4f1"},{"label":"iOS Pentesting"}]},{"id":"WCGg76EnwQqVjFZoRpNS","title":"iOS Protocol Handlers","pathname":"/mobile-pentesting/ios-pentesting/ios-protocol-handlers","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Mobile Pentesting","emoji":"1f4f1"},{"label":"iOS Pentesting"}]},{"id":"jqCE5bbvoQl5myUZs1GN","title":"iOS Serialisation and Encoding","pathname":"/mobile-pentesting/ios-pentesting/ios-serialisation-and-encoding","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Mobile Pentesting","emoji":"1f4f1"},{"label":"iOS Pentesting"}]},{"id":"6J4dQ3ZXsiMltVPiMfva","title":"iOS Testing Environment","pathname":"/mobile-pentesting/ios-pentesting/ios-testing-environment","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Mobile Pentesting","emoji":"1f4f1"},{"label":"iOS Pentesting"}]},{"id":"X8nkasbWuNpluLL6qfTL","title":"iOS UIActivity Sharing","pathname":"/mobile-pentesting/ios-pentesting/ios-uiactivity-sharing","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Mobile Pentesting","emoji":"1f4f1"},{"label":"iOS Pentesting"}]},{"id":"uEhCFHN88cdPHNekTp9l","title":"iOS Universal Links","pathname":"/mobile-pentesting/ios-pentesting/ios-universal-links","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Mobile Pentesting","emoji":"1f4f1"},{"label":"iOS Pentesting"}]},{"id":"i0s3bvCLC8KXWTskLJBu","title":"iOS UIPasteboard","pathname":"/mobile-pentesting/ios-pentesting/ios-uipasteboard","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Mobile Pentesting","emoji":"1f4f1"},{"label":"iOS Pentesting"}]},{"id":"HLzlSJBukOH4ca4XST7N","title":"iOS WebViews","pathname":"/mobile-pentesting/ios-pentesting/ios-webviews","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Mobile Pentesting","emoji":"1f4f1"},{"label":"iOS Pentesting"}]},{"id":"DBWeM1bvtKHHmv4MSOSf","title":"Cordova Apps","pathname":"/mobile-pentesting/cordova-apps","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Mobile Pentesting","emoji":"1f4f1"}]},{"id":"oX0pUAm4mpaBmoVnEhyD","title":"Xamarin Apps","pathname":"/mobile-pentesting/xamarin-apps","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Mobile Pentesting","emoji":"1f4f1"}]},{"id":"XaZCLz34kqrvZdJ9UexR","title":"Pentesting JDWP - Java Debug Wire Protocol","pathname":"/network-services-pentesting/pentesting-jdwp-java-debug-wire-protocol","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"VKLfIbxkuroz8aZvlbZ2","title":"Pentesting SAP","pathname":"/network-services-pentesting/pentesting-sap","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"gffBNKxULtFhjEJBdQeo","title":"Pentesting VoIP","pathname":"/network-services-pentesting/pentesting-voip","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"mmWv7J89iwzwKhhOeeX9","title":"Basic VoIP Protocols","pathname":"/network-services-pentesting/pentesting-voip/basic-voip-protocols","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"Pentesting VoIP"}]},{"id":"9APyZKtGejW7NjQJLa4j","title":"SIP (Session Initiation Protocol)","pathname":"/network-services-pentesting/pentesting-voip/basic-voip-protocols/sip-session-initiation-protocol","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"Pentesting VoIP"},{"label":"Basic VoIP Protocols"}]},{"id":"PwrZpyEorckBDwTvq8iH","title":"Pentesting Remote GdbServer","pathname":"/network-services-pentesting/pentesting-remote-gdbserver","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"UVL9ZoHfn2GLKcLal0yJ","title":"7/tcp/udp - Pentesting Echo","pathname":"/network-services-pentesting/7-tcp-udp-pentesting-echo","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"6NNXE89ZEBY0cU9Sd0kT","title":"21 - Pentesting FTP","pathname":"/network-services-pentesting/pentesting-ftp","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"IHfpYAfKbONViEpRzFhO","title":"FTP Bounce attack - Scan","pathname":"/network-services-pentesting/pentesting-ftp/ftp-bounce-attack","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"21 - Pentesting FTP"}]},{"id":"0sFnOWVGFVg1qvFRKXqG","title":"FTP Bounce - Download 2ºFTP file","pathname":"/network-services-pentesting/pentesting-ftp/ftp-bounce-download-2oftp-file","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"21 - Pentesting FTP"}]},{"id":"AnxkXHGaqZCDrjrVOE0e","title":"22 - Pentesting SSH/SFTP","pathname":"/network-services-pentesting/pentesting-ssh","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"naeJIEzEptMBUY8PZUnn","title":"23 - Pentesting Telnet","pathname":"/network-services-pentesting/pentesting-telnet","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"IHinlULJx738zHc4vYgu","title":"25,465,587 - Pentesting SMTP/s","pathname":"/network-services-pentesting/pentesting-smtp","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"xUsIYjmu6p72qFPXHWce","title":"SMTP Smuggling","pathname":"/network-services-pentesting/pentesting-smtp/smtp-smuggling","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"25,465,587 - Pentesting SMTP/s"}]},{"id":"9nSIT2rbZ5A3uqTBdAxv","title":"SMTP - Commands","pathname":"/network-services-pentesting/pentesting-smtp/smtp-commands","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"25,465,587 - Pentesting SMTP/s"}]},{"id":"Ks2VzyRGvx4C6m15CO5E","title":"43 - Pentesting WHOIS","pathname":"/network-services-pentesting/43-pentesting-whois","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"NORlXR2SoyNcire5IySV","title":"49 - Pentesting TACACS+","pathname":"/network-services-pentesting/49-pentesting-tacacs+","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"BbGlV11P2IjsRAgTjrPe","title":"53 - Pentesting DNS","pathname":"/network-services-pentesting/pentesting-dns","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"3ieX8DzruqWXVSEQDjjz","title":"69/UDP TFTP/Bittorrent-tracker","pathname":"/network-services-pentesting/69-udp-tftp","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"gYYLzXpJa6RW8xvhZ729","title":"79 - Pentesting Finger","pathname":"/network-services-pentesting/pentesting-finger","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"HNjYUrmM1oLQC2pnSwis","title":"80,443 - Pentesting Web Methodology","pathname":"/network-services-pentesting/pentesting-web","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"1ACgg4CdnFmtcbc1PhxI","title":"403 & 401 Bypasses","pathname":"/network-services-pentesting/pentesting-web/403-and-401-bypasses","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"}]},{"id":"WazAZcX9xkdWJKNyFkEY","title":"AEM - Adobe Experience Cloud","pathname":"/network-services-pentesting/pentesting-web/aem-adobe-experience-cloud","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"}]},{"id":"whJhuCyBJBl1o1J9bhvI","title":"Angular","pathname":"/network-services-pentesting/pentesting-web/angular","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"}]},{"id":"ucEYy8uDWo0yHGlT272R","title":"Apache","pathname":"/network-services-pentesting/pentesting-web/apache","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"}]},{"id":"Z3QjoUs0VEnS8HmSAT6h","title":"Artifactory Hacking guide","pathname":"/network-services-pentesting/pentesting-web/artifactory-hacking-guide","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"}]},{"id":"mFPHOkPpFzzZy9Ipdrgu","title":"Bolt CMS","pathname":"/network-services-pentesting/pentesting-web/bolt-cms","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"}]},{"id":"dSehvyEZYygsrqHPhzQr","title":"Buckets","pathname":"/network-services-pentesting/pentesting-web/buckets","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"}]},{"id":"K1FFsCh15UU2v3j32A5Y","title":"Firebase Database","pathname":"/network-services-pentesting/pentesting-web/buckets/firebase-database","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"},{"label":"Buckets"}]},{"id":"RvqXa7BQ1bGt7qEmxIZ8","title":"CGI","pathname":"/network-services-pentesting/pentesting-web/cgi","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"}]},{"id":"a82Ev1ttPDc5ASHDsF8a","title":"DotNetNuke (DNN)","pathname":"/network-services-pentesting/pentesting-web/dotnetnuke-dnn","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"}]},{"id":"juBq5Lz69RIOLwSohb3w","title":"Drupal","pathname":"/network-services-pentesting/pentesting-web/drupal","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"}]},{"id":"9KHi8hTWLgTRa4irA6IY","title":"Electron Desktop Apps","pathname":"/network-services-pentesting/pentesting-web/electron-desktop-apps","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"}]},{"id":"kIblVS14GlY3yPYOW5JC","title":"Electron contextIsolation RCE via preload code","pathname":"/network-services-pentesting/pentesting-web/electron-desktop-apps/electron-contextisolation-rce-via-preload-code","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"},{"label":"Electron Desktop Apps"}]},{"id":"S47bIVyj2BKxvSFoQnFT","title":"Electron contextIsolation RCE via Electron internal code","pathname":"/network-services-pentesting/pentesting-web/electron-desktop-apps/electron-contextisolation-rce-via-electron-internal-code","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"},{"label":"Electron Desktop Apps"}]},{"id":"11xTdvWsRiYIQiBGwpBZ","title":"Electron contextIsolation RCE via IPC","pathname":"/network-services-pentesting/pentesting-web/electron-desktop-apps/electron-contextisolation-rce-via-ipc","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"},{"label":"Electron Desktop Apps"}]},{"id":"GUL277H5l57UgJWCpcNI","title":"Flask","pathname":"/network-services-pentesting/pentesting-web/flask","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"}]},{"id":"dN4PH6tac37tg1MbAZJC","title":"NodeJS Express","pathname":"/network-services-pentesting/pentesting-web/nodejs-express","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"}]},{"id":"Fj0HWsrga02hqBqLXU3x","title":"Git","pathname":"/network-services-pentesting/pentesting-web/git","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"}]},{"id":"XR2F0cbq88KvYvZJ7OTr","title":"Golang","pathname":"/network-services-pentesting/pentesting-web/golang","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"}]},{"id":"ZEgOlMcQk3GHodADWhIo","title":"GWT - Google Web Toolkit","pathname":"/network-services-pentesting/pentesting-web/gwt-google-web-toolkit","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"}]},{"id":"Csy6vX5ZzvrFXp0pFoik","title":"Grafana","pathname":"/network-services-pentesting/pentesting-web/grafana","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"}]},{"id":"YQsc1g0cy2Qw9K2PRtdc","title":"GraphQL","pathname":"/network-services-pentesting/pentesting-web/graphql","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"}]},{"id":"85X2cslg2pHaFLBIYX59","title":"H2 - Java SQL database","pathname":"/network-services-pentesting/pentesting-web/h2-java-sql-database","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"}]},{"id":"ap3Gu31QwVu9inY0Mb9J","title":"IIS - Internet Information Services","pathname":"/network-services-pentesting/pentesting-web/iis-internet-information-services","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"}]},{"id":"MO2qDbuL17zfeEmogFZG","title":"ImageMagick Security","pathname":"/network-services-pentesting/pentesting-web/imagemagick-security","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"}]},{"id":"4qXtpoTczHLexKzB58Fz","title":"JBOSS","pathname":"/network-services-pentesting/pentesting-web/jboss","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"}]},{"id":"Osghera5UA4ak90A17tH","title":"JIRA","pathname":"/network-services-pentesting/pentesting-web/jira","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"}]},{"id":"CtJGXTBGp7An8uIBIy9T","title":"Joomla","pathname":"/network-services-pentesting/pentesting-web/joomla","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"}]},{"id":"rn1f8LyOdN4pnareLDxj","title":"JSP","pathname":"/network-services-pentesting/pentesting-web/jsp","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"}]},{"id":"ZdmVOvmZsf7cOCZfgcsZ","title":"Laravel","pathname":"/network-services-pentesting/pentesting-web/laravel","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"}]},{"id":"iUWwDPFrUicf9fp2mZ2o","title":"Moodle","pathname":"/network-services-pentesting/pentesting-web/moodle","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"}]},{"id":"aHPCiD8kOzB677OI1dDB","title":"Nginx","pathname":"/network-services-pentesting/pentesting-web/nginx","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"}]},{"id":"PdwJClrdEnGGxzJrHSCT","title":"PHP Tricks","pathname":"/network-services-pentesting/pentesting-web/php-tricks-esp","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"}]},{"id":"cmuedrEDVC6QODT6zOUr","title":"PHP - Useful Functions & disable_functions/open_basedir bypass","pathname":"/network-services-pentesting/pentesting-web/php-tricks-esp/php-useful-functions-disable_functions-open_basedir-bypass","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"},{"label":"PHP Tricks"}]},{"id":"GduLOGfK4As2oBl9TadC","title":"disable_functions bypass - php-fpm/FastCGI","pathname":"/network-services-pentesting/pentesting-web/php-tricks-esp/php-useful-functions-disable_functions-open_basedir-bypass/disable_functions-bypass-php-fpm-fastcgi","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"},{"label":"PHP Tricks"},{"label":"PHP - Useful Functions & disable_functions/open_basedir bypass"}]},{"id":"3P14ufuzs9AevexjPNrv","title":"disable_functions bypass - dl function","pathname":"/network-services-pentesting/pentesting-web/php-tricks-esp/php-useful-functions-disable_functions-open_basedir-bypass/disable_functions-bypass-dl-function","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"},{"label":"PHP Tricks"},{"label":"PHP - Useful Functions & disable_functions/open_basedir bypass"}]},{"id":"WNsCVZV3KuxGPdZjrLzT","title":"disable_functions bypass - PHP 7.0-7.4 (*nix only)","pathname":"/network-services-pentesting/pentesting-web/php-tricks-esp/php-useful-functions-disable_functions-open_basedir-bypass/disable_functions-bypass-php-7.0-7.4-nix-only","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"},{"label":"PHP Tricks"},{"label":"PHP - Useful Functions & disable_functions/open_basedir bypass"}]},{"id":"uTd85IC00q0BNzFAEEd0","title":"disable_functions bypass - Imagick <= 3.3.0 PHP >= 5.4 Exploit","pathname":"/network-services-pentesting/pentesting-web/php-tricks-esp/php-useful-functions-disable_functions-open_basedir-bypass/disable_functions-bypass-imagick-less-than-3.3.0-php-greater-than-5.4-exploit","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"},{"label":"PHP Tricks"},{"label":"PHP - Useful Functions & disable_functions/open_basedir bypass"}]},{"id":"GYY7R2E42sSz0VjrxGAB","title":"disable_functions - PHP 5.x Shellshock Exploit","pathname":"/network-services-pentesting/pentesting-web/php-tricks-esp/php-useful-functions-disable_functions-open_basedir-bypass/disable_functions-php-5.x-shellshock-exploit","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"},{"label":"PHP Tricks"},{"label":"PHP - Useful Functions & disable_functions/open_basedir bypass"}]},{"id":"nxOTK1GHYH01hIDeUFMV","title":"disable_functions - PHP 5.2.4 ionCube extension Exploit","pathname":"/network-services-pentesting/pentesting-web/php-tricks-esp/php-useful-functions-disable_functions-open_basedir-bypass/disable_functions-php-5.2.4-ioncube-extension-exploit","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"},{"label":"PHP Tricks"},{"label":"PHP - Useful Functions & disable_functions/open_basedir bypass"}]},{"id":"yMOJTuzRfbf9TvIpTLrd","title":"disable_functions bypass - PHP <= 5.2.9 on windows","pathname":"/network-services-pentesting/pentesting-web/php-tricks-esp/php-useful-functions-disable_functions-open_basedir-bypass/disable_functions-bypass-php-less-than-5.2.9-on-windows","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"},{"label":"PHP Tricks"},{"label":"PHP - Useful Functions & disable_functions/open_basedir bypass"}]},{"id":"rJIOgDbS7BcjzUDzbn9D","title":"disable_functions bypass - PHP 5.2.4 and 5.2.5 PHP cURL","pathname":"/network-services-pentesting/pentesting-web/php-tricks-esp/php-useful-functions-disable_functions-open_basedir-bypass/disable_functions-bypass-php-5.2.4-and-5.2.5-php-curl","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"},{"label":"PHP Tricks"},{"label":"PHP - Useful Functions & disable_functions/open_basedir bypass"}]},{"id":"LU6xkFe7DwqIqOdabvn1","title":"disable_functions bypass - PHP safe_mode bypass via proc_open() and custom environment Exploit","pathname":"/network-services-pentesting/pentesting-web/php-tricks-esp/php-useful-functions-disable_functions-open_basedir-bypass/disable_functions-bypass-php-safe_mode-bypass-via-proc_open-and-custom-environment-exploit","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"},{"label":"PHP Tricks"},{"label":"PHP - Useful Functions & disable_functions/open_basedir bypass"}]},{"id":"rcIJKlxsl8vDcqzvJ3zi","title":"disable_functions bypass - PHP Perl Extension Safe_mode Bypass Exploit","pathname":"/network-services-pentesting/pentesting-web/php-tricks-esp/php-useful-functions-disable_functions-open_basedir-bypass/disable_functions-bypass-php-perl-extension-safe_mode-bypass-exploit","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"},{"label":"PHP Tricks"},{"label":"PHP - Useful Functions & disable_functions/open_basedir bypass"}]},{"id":"HP5ywR5WIc84z7aIEIVH","title":"disable_functions bypass - PHP 5.2.3 - Win32std ext Protections Bypass","pathname":"/network-services-pentesting/pentesting-web/php-tricks-esp/php-useful-functions-disable_functions-open_basedir-bypass/disable_functions-bypass-php-5.2.3-win32std-ext-protections-bypass","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"},{"label":"PHP Tricks"},{"label":"PHP - Useful Functions & disable_functions/open_basedir bypass"}]},{"id":"cngfbwLDWIhGqYaH3jIr","title":"disable_functions bypass - PHP 5.2 - FOpen Exploit","pathname":"/network-services-pentesting/pentesting-web/php-tricks-esp/php-useful-functions-disable_functions-open_basedir-bypass/disable_functions-bypass-php-5.2-fopen-exploit","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"},{"label":"PHP Tricks"},{"label":"PHP - Useful Functions & disable_functions/open_basedir bypass"}]},{"id":"YJv8bG74HP06ZjFkm9r3","title":"disable_functions bypass - via mem","pathname":"/network-services-pentesting/pentesting-web/php-tricks-esp/php-useful-functions-disable_functions-open_basedir-bypass/disable_functions-bypass-via-mem","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"},{"label":"PHP Tricks"},{"label":"PHP - Useful Functions & disable_functions/open_basedir bypass"}]},{"id":"yhH2kHSQOHfrNgc0YT9x","title":"disable_functions bypass - mod_cgi","pathname":"/network-services-pentesting/pentesting-web/php-tricks-esp/php-useful-functions-disable_functions-open_basedir-bypass/disable_functions-bypass-mod_cgi","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"},{"label":"PHP Tricks"},{"label":"PHP - Useful Functions & disable_functions/open_basedir bypass"}]},{"id":"opxLzVvKm80m6k7qtbxG","title":"disable_functions bypass - PHP 4 >= 4.2.0, PHP 5 pcntl_exec","pathname":"/network-services-pentesting/pentesting-web/php-tricks-esp/php-useful-functions-disable_functions-open_basedir-bypass/disable_functions-bypass-php-4-greater-than-4.2.0-php-5-pcntl_exec","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"},{"label":"PHP Tricks"},{"label":"PHP - Useful Functions & disable_functions/open_basedir bypass"}]},{"id":"7Ss9gldyN63DgkIRCwt2","title":"PHP - RCE abusing object creation: new $_GET[\"a\"]($_GET[\"b\"])","pathname":"/network-services-pentesting/pentesting-web/php-tricks-esp/php-rce-abusing-object-creation-new-usd_get-a-usd_get-b","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"},{"label":"PHP Tricks"}]},{"id":"7N2yP0ySHDDT0yrEwBnr","title":"PHP SSRF","pathname":"/network-services-pentesting/pentesting-web/php-tricks-esp/php-ssrf","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"},{"label":"PHP Tricks"}]},{"id":"SjH7agbFK5HpcYrvIORz","title":"Python","pathname":"/network-services-pentesting/pentesting-web/python","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"}]},{"id":"hBi4aKF1wrFpCOawmNiF","title":"Rocket Chat","pathname":"/network-services-pentesting/pentesting-web/rocket-chat","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"}]},{"id":"QFGRZJaaqbiUxPTFYlxx","title":"Special HTTP headers","pathname":"/network-services-pentesting/pentesting-web/special-http-headers","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"}]},{"id":"OdkBVUiH3zg9T6mpXl6p","title":"Source code Review / SAST Tools","pathname":"/network-services-pentesting/pentesting-web/code-review-tools","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"}]},{"id":"3zT9V6abaEwFocqdfKix","title":"Spring Actuators","pathname":"/network-services-pentesting/pentesting-web/spring-actuators","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"}]},{"id":"Lk1MaUqjNUvmtHsiZNhE","title":"Symfony","pathname":"/network-services-pentesting/pentesting-web/symphony","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"}]},{"id":"vzQDE0jBDuvND7KMcgiY","title":"Tomcat","pathname":"/network-services-pentesting/pentesting-web/tomcat","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"}]},{"id":"Yd7KeFTSKbCUG1emHt72","title":"Basic Tomcat Info","pathname":"/network-services-pentesting/pentesting-web/tomcat/basic-tomcat-info","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"},{"label":"Tomcat"}]},{"id":"YIAYHBsdIgav2eNUrYj9","title":"Uncovering CloudFlare","pathname":"/network-services-pentesting/pentesting-web/uncovering-cloudflare","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"}]},{"id":"H0qLemaERdCodPma6nl9","title":"VMWare (ESX, VCenter...)","pathname":"/network-services-pentesting/pentesting-web/vmware-esx-vcenter...","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"}]},{"id":"xiH3oVfE1o2QAYhuzfyP","title":"WAF Bypass","pathname":"/network-services-pentesting/pentesting-web/waf-bypass","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"}]},{"id":"gE4gXu07ocp1pcBs2f9i","title":"Web API Pentesting","pathname":"/network-services-pentesting/pentesting-web/web-api-pentesting","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"}]},{"id":"9rPvXhzJMGyYmvOMEEfp","title":"WebDav","pathname":"/network-services-pentesting/pentesting-web/put-method-webdav","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"}]},{"id":"4DyGUW9nwEtdXnOnZ5S5","title":"Werkzeug / Flask Debug","pathname":"/network-services-pentesting/pentesting-web/werkzeug","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"}]},{"id":"JR3ctxLUL62jPs9QvrDo","title":"Wordpress","pathname":"/network-services-pentesting/pentesting-web/wordpress","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"80,443 - Pentesting Web Methodology"}]},{"id":"eCOzH76PrzKmI5lMimCx","title":"88tcp/udp - Pentesting Kerberos","pathname":"/network-services-pentesting/pentesting-kerberos-88","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"6VIiL9OYILN8qfAnsuVS","title":"Harvesting tickets from Windows","pathname":"/network-services-pentesting/pentesting-kerberos-88/harvesting-tickets-from-windows","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"88tcp/udp - Pentesting Kerberos"}]},{"id":"2663PjzKGCgzeOTFgGIL","title":"Harvesting tickets from Linux","pathname":"/network-services-pentesting/pentesting-kerberos-88/harvesting-tickets-from-linux","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"88tcp/udp - Pentesting Kerberos"}]},{"id":"A8UgXEyQpVM9dDaVVjEk","title":"110,995 - Pentesting POP","pathname":"/network-services-pentesting/pentesting-pop","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"zD1xMBeDNZnNseVazzNf","title":"111/TCP/UDP - Pentesting Portmapper","pathname":"/network-services-pentesting/pentesting-rpcbind","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"CqAN9kycFXcaoc4D3VUH","title":"113 - Pentesting Ident","pathname":"/network-services-pentesting/113-pentesting-ident","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"Zm9VMEL8o6MGWOUJXrzT","title":"123/udp - Pentesting NTP","pathname":"/network-services-pentesting/pentesting-ntp","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"rkk0gGGXyajWiYlbaunD","title":"135, 593 - Pentesting MSRPC","pathname":"/network-services-pentesting/135-pentesting-msrpc","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"eL5oPu7cHPIS4SLJ300E","title":"137,138,139 - Pentesting NetBios","pathname":"/network-services-pentesting/137-138-139-pentesting-netbios","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"6dRBuamDW8c9qRxPVRPe","title":"139,445 - Pentesting SMB","pathname":"/network-services-pentesting/pentesting-smb","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"6sFbPOxh0miwaCcDnLLk","title":"rpcclient enumeration","pathname":"/network-services-pentesting/pentesting-smb/rpcclient-enumeration","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"139,445 - Pentesting SMB"}]},{"id":"UxVRP2aGrCWguDZdTwEX","title":"143,993 - Pentesting IMAP","pathname":"/network-services-pentesting/pentesting-imap","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"78tq9vTf2rwhvt398RLf","title":"161,162,10161,10162/udp - Pentesting SNMP","pathname":"/network-services-pentesting/pentesting-snmp","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"nmCyhaLY12YHgt26Jw9R","title":"Cisco SNMP","pathname":"/network-services-pentesting/pentesting-snmp/cisco-snmp","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"161,162,10161,10162/udp - Pentesting SNMP"}]},{"id":"g4u00HH4fuByx3Ux7yGr","title":"SNMP RCE","pathname":"/network-services-pentesting/pentesting-snmp/snmp-rce","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"161,162,10161,10162/udp - Pentesting SNMP"}]},{"id":"SRgRViyfd5cx4mbl1wqm","title":"194,6667,6660-7000 - Pentesting IRC","pathname":"/network-services-pentesting/pentesting-irc","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"c5eyocxZBU52YMb4v9BA","title":"264 - Pentesting Check Point FireWall-1","pathname":"/network-services-pentesting/pentesting-264-check-point-firewall-1","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"R0Yf80yXKM6IqcZVXzmD","title":"389, 636, 3268, 3269 - Pentesting LDAP","pathname":"/network-services-pentesting/pentesting-ldap","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"RuAp8lVNEshf42RCRVwp","title":"500/udp - Pentesting IPsec/IKE VPN","pathname":"/network-services-pentesting/ipsec-ike-vpn-pentesting","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"T74U0NYfGuUtEkJrPVAP","title":"502 - Pentesting Modbus","pathname":"/network-services-pentesting/pentesting-modbus","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"n7UgnuamGXD33zw8zIes","title":"512 - Pentesting Rexec","pathname":"/network-services-pentesting/512-pentesting-rexec","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"KFXYzzsE0U9LOyGMzTNS","title":"513 - Pentesting Rlogin","pathname":"/network-services-pentesting/pentesting-rlogin","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"QK3DubRAB4m28RA3RoDm","title":"514 - Pentesting Rsh","pathname":"/network-services-pentesting/pentesting-rsh","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"wiB0MizimYQ3zJrVlhLC","title":"515 - Pentesting Line Printer Daemon (LPD)","pathname":"/network-services-pentesting/515-pentesting-line-printer-daemon-lpd","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"vIfbyhT45j6nhJ0E7ZIm","title":"548 - Pentesting Apple Filing Protocol (AFP)","pathname":"/network-services-pentesting/584-pentesting-afp","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"KrbaGSA4zvpMEOkADcZt","title":"554,8554 - Pentesting RTSP","pathname":"/network-services-pentesting/554-8554-pentesting-rtsp","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"kDBhqSMlotvO8rBNpQqA","title":"623/UDP/TCP - IPMI","pathname":"/network-services-pentesting/623-udp-ipmi","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"CrnIsyJksRkfRCht2ZPv","title":"631 - Internet Printing Protocol(IPP)","pathname":"/network-services-pentesting/pentesting-631-internet-printing-protocol-ipp","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"pKehRx2HSN6zKOZ8FZfr","title":"700 - Pentesting EPP","pathname":"/network-services-pentesting/700-pentesting-epp","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"lugeNgAH8Om2VdFJ7VHM","title":"873 - Pentesting Rsync","pathname":"/network-services-pentesting/873-pentesting-rsync","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"ucimQIcsLgNM7ar4aMVN","title":"1026 - Pentesting Rusersd","pathname":"/network-services-pentesting/1026-pentesting-rusersd","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"XgXqPqR6FFk4LE94QaBY","title":"1080 - Pentesting Socks","pathname":"/network-services-pentesting/1080-pentesting-socks","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"Wx4HsAKZzTWqqp51sLKB","title":"1098/1099/1050 - Pentesting Java RMI - RMI-IIOP","pathname":"/network-services-pentesting/1099-pentesting-java-rmi","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"JMMXUoM3gEa0cDrIQm7m","title":"1414 - Pentesting IBM MQ","pathname":"/network-services-pentesting/1414-pentesting-ibmmq","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"LNQVf3yRpKTdaE4cmAf1","title":"1433 - Pentesting MSSQL - Microsoft SQL Server","pathname":"/network-services-pentesting/pentesting-mssql-microsoft-sql-server","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"joljbKcrVLsFmlyg3Scb","title":"Types of MSSQL Users","pathname":"/network-services-pentesting/pentesting-mssql-microsoft-sql-server/types-of-mssql-users","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"1433 - Pentesting MSSQL - Microsoft SQL Server"}]},{"id":"9qQ5Ch7AqbpiquB3spkE","title":"1521,1522-1529 - Pentesting Oracle TNS Listener","pathname":"/network-services-pentesting/1521-1522-1529-pentesting-oracle-listener","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"bcLtUUvn3i35d0E6FlrI","title":"1723 - Pentesting PPTP","pathname":"/network-services-pentesting/1723-pentesting-pptp","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"VyHlG5aS0l41Yftpw9UF","title":"1883 - Pentesting MQTT (Mosquitto)","pathname":"/network-services-pentesting/1883-pentesting-mqtt-mosquitto","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"RhgMxn5Aogwt0v8ONpDp","title":"2049 - Pentesting NFS Service","pathname":"/network-services-pentesting/nfs-service-pentesting","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"HRwn4otkLKR13FBTRwkj","title":"2301,2381 - Pentesting Compaq/HP Insight Manager","pathname":"/network-services-pentesting/pentesting-compaq-hp-insight-manager","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"PugILuEQPS7Q7WGgDa0N","title":"2375, 2376 Pentesting Docker","pathname":"/network-services-pentesting/2375-pentesting-docker","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"osh4hIhlwyAviOX6asf6","title":"3128 - Pentesting Squid","pathname":"/network-services-pentesting/3128-pentesting-squid","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"W8EZJHv8iFbjb5q1l993","title":"3260 - Pentesting ISCSI","pathname":"/network-services-pentesting/3260-pentesting-iscsi","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"Ytxa66cJLEwyPpABbssA","title":"3299 - Pentesting SAPRouter","pathname":"/network-services-pentesting/3299-pentesting-saprouter","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"mMFSreIe3HSoKz2JrJ7R","title":"3306 - Pentesting Mysql","pathname":"/network-services-pentesting/pentesting-mysql","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"YY51JevVP5KpqIe0XNM0","title":"3389 - Pentesting RDP","pathname":"/network-services-pentesting/pentesting-rdp","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"F9TR4JyBMLCpqLbKgPt3","title":"3632 - Pentesting distcc","pathname":"/network-services-pentesting/3632-pentesting-distcc","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"YnM6UMR51XjmJp4DKw9S","title":"3690 - Pentesting Subversion (svn server)","pathname":"/network-services-pentesting/3690-pentesting-subversion-svn-server","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"WUxALQVwJzrZCQ3AFYkR","title":"3702/UDP - Pentesting WS-Discovery","pathname":"/network-services-pentesting/3702-udp-pentesting-ws-discovery","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"6O4QzSb4U6uI8mTX7EWI","title":"4369 - Pentesting Erlang Port Mapper Daemon (epmd)","pathname":"/network-services-pentesting/4369-pentesting-erlang-port-mapper-daemon-epmd","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"teh9siPJ6VvRmT8EsUqG","title":"4786 - Cisco Smart Install","pathname":"/network-services-pentesting/4786-cisco-smart-install","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"jrBl16t1iFu9O3crrRE5","title":"4840 - OPC Unified Architecture","pathname":"/network-services-pentesting/4840-pentesting-opc-ua","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"xbr30UYHtpij7XHz2sUs","title":"5000 - Pentesting Docker Registry","pathname":"/network-services-pentesting/5000-pentesting-docker-registry","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"1YzMbJmXvGt2rWOrXiId","title":"5353/UDP Multicast DNS (mDNS) and DNS-SD","pathname":"/network-services-pentesting/5353-udp-multicast-dns-mdns","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"LTRUAyXIZcqisVw7jags","title":"5432,5433 - Pentesting Postgresql","pathname":"/network-services-pentesting/pentesting-postgresql","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"vCRmYJ1aBsshaewaXxFg","title":"5439 - Pentesting Redshift","pathname":"/network-services-pentesting/5439-pentesting-redshift","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"K8g5rHs14OKHa2YqPd7o","title":"5555 - Android Debug Bridge","pathname":"/network-services-pentesting/5555-android-debug-bridge","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"bKHZGT7FnnFAGMKHmA6O","title":"5601 - Pentesting Kibana","pathname":"/network-services-pentesting/5601-pentesting-kibana","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"MoDIRGEj4bTAmw2GD8X7","title":"5671,5672 - Pentesting AMQP","pathname":"/network-services-pentesting/5671-5672-pentesting-amqp","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"5AFxr95DVJ19nMJfOrBe","title":"5800,5801,5900,5901 - Pentesting VNC","pathname":"/network-services-pentesting/pentesting-vnc","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"RJRdT6apKDZb4jFhJ67F","title":"5984,6984 - Pentesting CouchDB","pathname":"/network-services-pentesting/5984-pentesting-couchdb","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"z18SpOILzltOUXg5JOSW","title":"5985,5986 - Pentesting WinRM","pathname":"/network-services-pentesting/5985-5986-pentesting-winrm","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"Sqqt0U0w4xYUy3FEUvut","title":"5985,5986 - Pentesting OMI","pathname":"/network-services-pentesting/5985-5986-pentesting-omi","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"d8aY5LO4BOhv5rZVWp3h","title":"6000 - Pentesting X11","pathname":"/network-services-pentesting/6000-pentesting-x11","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"vllBx93yfqg4HV5R1nUZ","title":"6379 - Pentesting Redis","pathname":"/network-services-pentesting/6379-pentesting-redis","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"RVr5T9XVO7wP812CnLrx","title":"8009 - Pentesting Apache JServ Protocol (AJP)","pathname":"/network-services-pentesting/8009-pentesting-apache-jserv-protocol-ajp","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"v9Nnj6aeuRcu87f9val3","title":"8086 - Pentesting InfluxDB","pathname":"/network-services-pentesting/8086-pentesting-influxdb","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"1lGvGEg9dNOpZOYpvusR","title":"8089 - Pentesting Splunkd","pathname":"/network-services-pentesting/8089-splunkd","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"Xs0E65IQrAscVz3rg7T3","title":"8333,18333,38333,18444 - Pentesting Bitcoin","pathname":"/network-services-pentesting/8333-18333-38333-18444-pentesting-bitcoin","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"uK8EzartjL62wDvE9Lf5","title":"9000 - Pentesting FastCGI","pathname":"/network-services-pentesting/9000-pentesting-fastcgi","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"d2Hdz0h4tSKDPBiiWntC","title":"9001 - Pentesting HSQLDB","pathname":"/network-services-pentesting/9001-pentesting-hsqldb","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"ts0BKu9d4rC6iixQIdao","title":"9042/9160 - Pentesting Cassandra","pathname":"/network-services-pentesting/cassandra","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"fn8GMCmCJ3sbaPT7nkby","title":"9100 - Pentesting Raw Printing (JetDirect, AppSocket, PDL-datastream)","pathname":"/network-services-pentesting/9100-pjl","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"uyREUetcI1sR2CMA9Xdn","title":"9200 - Pentesting Elasticsearch","pathname":"/network-services-pentesting/9200-pentesting-elasticsearch","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"PFDXWTvnjf9ZZuBSPD8W","title":"10000 - Pentesting Network Data Management Protocol (ndmp)","pathname":"/network-services-pentesting/10000-network-data-management-protocol-ndmp","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"EdeRc2hkFvk1e7rGCfJb","title":"11211 - Pentesting Memcache","pathname":"/network-services-pentesting/11211-memcache","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"N3Cx1wiK02yqtP4yjwkX","title":"Memcache Commands","pathname":"/network-services-pentesting/11211-memcache/memcache-commands","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"},{"label":"11211 - Pentesting Memcache"}]},{"id":"VbbLy08AoqS0xS2QW2H5","title":"15672 - Pentesting RabbitMQ Management","pathname":"/network-services-pentesting/15672-pentesting-rabbitmq-management","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"dMpnpCKLOpfexzEq1xGT","title":"24007,24008,24009,49152 - Pentesting GlusterFS","pathname":"/network-services-pentesting/24007-24008-24009-49152-pentesting-glusterfs","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"pabR9hKBmmT4fNSgO6Ty","title":"27017,27018 - Pentesting MongoDB","pathname":"/network-services-pentesting/27017-27018-mongodb","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"3m0r8y3Xrz8Qoyg5iWwq","title":"44134 - Pentesting Tiller (Helm)","pathname":"/network-services-pentesting/44134-pentesting-tiller-helm","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"IwTXAaG4bUZ7FOLTTXIE","title":"44818/UDP/TCP - Pentesting EthernetIP","pathname":"/network-services-pentesting/44818-ethernetip","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"gJhe3N5MFr78UOoOzH8v","title":"47808/udp - Pentesting BACNet","pathname":"/network-services-pentesting/47808-udp-bacnet","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"svbGd6NN1OyRPpCtIda4","title":"50030,50060,50070,50075,50090 - Pentesting Hadoop","pathname":"/network-services-pentesting/50030-50060-50070-50075-50090-pentesting-hadoop","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Network Services Pentesting","emoji":"1f47d"}]},{"id":"Dabl96N3IKqdjxNfwb5b","title":"Web Vulnerabilities Methodology","pathname":"/pentesting-web/web-vulnerabilities-methodology","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"haFAz3ZGJsKg5b3l1Uno","title":"Reflecting Techniques - PoCs and Polygloths CheatSheet","pathname":"/pentesting-web/pocs-and-polygloths-cheatsheet","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"w4Gl5DA6adv471nVJodQ","title":"Web Vulns List","pathname":"/pentesting-web/pocs-and-polygloths-cheatsheet/web-vulns-list","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"Reflecting Techniques - PoCs and Polygloths CheatSheet"}]},{"id":"8vA29TuQteP2GtcbAjK2","title":"2FA/OTP Bypass","pathname":"/pentesting-web/2fa-bypass","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"77hnTRpOckBoY1leEqHh","title":"Account Takeover","pathname":"/pentesting-web/account-takeover","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"juh42e4svG97ZAYvtpQD","title":"Browser Extension Pentesting Methodology","pathname":"/pentesting-web/browser-extension-pentesting-methodology","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"JKb2PRRzSuluOoP4evXJ","title":"BrowExt - ClickJacking","pathname":"/pentesting-web/browser-extension-pentesting-methodology/browext-clickjacking","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"Browser Extension Pentesting Methodology"}]},{"id":"F4GKj9pMyzL7yEBqDB3K","title":"BrowExt - permissions & host_permissions","pathname":"/pentesting-web/browser-extension-pentesting-methodology/browext-permissions-and-host_permissions","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"Browser Extension Pentesting Methodology"}]},{"id":"fBdM7ifiuNReeyNmaOAQ","title":"BrowExt - XSS Example","pathname":"/pentesting-web/browser-extension-pentesting-methodology/browext-xss-example","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"Browser Extension Pentesting Methodology"}]},{"id":"IiIW35TAwiZ6jOlS2XqQ","title":"Bypass Payment Process","pathname":"/pentesting-web/bypass-payment-process","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"7gmie5Ms3YX5p90inxIk","title":"Captcha Bypass","pathname":"/pentesting-web/captcha-bypass","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"fpRfH38gu3LMdXUvYe7i","title":"Cache Poisoning and Cache Deception","pathname":"/pentesting-web/cache-deception","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"oVZVoQVfZlVFhxaaXwX1","title":"Cache Poisoning to DoS","pathname":"/pentesting-web/cache-deception/cache-poisoning-to-dos","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"Cache Poisoning and Cache Deception"}]},{"id":"kY649rW9zrz59WxFYhie","title":"Clickjacking","pathname":"/pentesting-web/clickjacking","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"cBv18TmxrrM57IKtnR24","title":"Client Side Template Injection (CSTI)","pathname":"/pentesting-web/client-side-template-injection-csti","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"H7oABFpVCO2RPsI29JXX","title":"Client Side Path Traversal","pathname":"/pentesting-web/client-side-path-traversal","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"wkDKpQRoyMBWUg0Oahul","title":"Command Injection","pathname":"/pentesting-web/command-injection","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"MNBsDILE5555KkghznPR","title":"Content Security Policy (CSP) Bypass","pathname":"/pentesting-web/content-security-policy-csp-bypass","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"6nMV1NkrWwnn4fG5W3oc","title":"CSP bypass: self + 'unsafe-inline' with Iframes","pathname":"/pentesting-web/content-security-policy-csp-bypass/csp-bypass-self-+-unsafe-inline-with-iframes","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"Content Security Policy (CSP) Bypass"}]},{"id":"4L2ItIP4svcobcVSHUXl","title":"Cookies Hacking","pathname":"/pentesting-web/hacking-with-cookies","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"Jquw9fOADP68cSod1fr8","title":"Cookie Tossing","pathname":"/pentesting-web/hacking-with-cookies/cookie-tossing","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"Cookies Hacking"}]},{"id":"8KILehT5r0wEYH2ZY8OH","title":"Cookie Jar Overflow","pathname":"/pentesting-web/hacking-with-cookies/cookie-jar-overflow","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"Cookies Hacking"}]},{"id":"6ICwoA9jcZ3zTMIiRE1p","title":"Cookie Bomb","pathname":"/pentesting-web/hacking-with-cookies/cookie-bomb","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"Cookies Hacking"}]},{"id":"WaHAeHx08kS7l4CxRx0l","title":"CORS - Misconfigurations & Bypass","pathname":"/pentesting-web/cors-bypass","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"6WBCoTfTuy7N6sSa6uTA","title":"CRLF (%0D%0A) Injection","pathname":"/pentesting-web/crlf-0d-0a","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"iwet6oCz6HrmzdGbLIEn","title":"CSRF (Cross Site Request Forgery)","pathname":"/pentesting-web/csrf-cross-site-request-forgery","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"0Hcu1iQGglZsJRzwvL0E","title":"Dangling Markup - HTML scriptless injection","pathname":"/pentesting-web/dangling-markup-html-scriptless-injection","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"HufPViIyQyc9qsDxNJIF","title":"SS-Leaks","pathname":"/pentesting-web/dangling-markup-html-scriptless-injection/ss-leaks","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"Dangling Markup - HTML scriptless injection"}]},{"id":"tTgDqncBpHsuUMo0feSU","title":"Dependency Confusion","pathname":"/pentesting-web/dependency-confusion","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"GZeCItjuY2yVZZdd3GAZ","title":"Deserialization","pathname":"/pentesting-web/deserialization","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"oUjk3fYFm25DjTxtd8k7","title":"NodeJS - __proto__ & prototype Pollution","pathname":"/pentesting-web/deserialization/nodejs-proto-prototype-pollution","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"Deserialization"}]},{"id":"CqzZo243o9fnrGvXFQGV","title":"Client Side Prototype Pollution","pathname":"/pentesting-web/deserialization/nodejs-proto-prototype-pollution/client-side-prototype-pollution","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"Deserialization"},{"label":"NodeJS - __proto__ & prototype Pollution"}]},{"id":"XEceGj41kB38NPkdeRbH","title":"Express Prototype Pollution Gadgets","pathname":"/pentesting-web/deserialization/nodejs-proto-prototype-pollution/express-prototype-pollution-gadgets","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"Deserialization"},{"label":"NodeJS - __proto__ & prototype Pollution"}]},{"id":"KaWVBGPaRl2m2sw1PhPZ","title":"Prototype Pollution to RCE","pathname":"/pentesting-web/deserialization/nodejs-proto-prototype-pollution/prototype-pollution-to-rce","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"Deserialization"},{"label":"NodeJS - __proto__ & prototype Pollution"}]},{"id":"bjEGNivf2gSfssa8tX0Y","title":"Java JSF ViewState (.faces) Deserialization","pathname":"/pentesting-web/deserialization/java-jsf-viewstate-.faces-deserialization","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"Deserialization"}]},{"id":"xsLweKQuDgWPACnlCVgN","title":"Java DNS Deserialization, GadgetProbe and Java Deserialization Scanner","pathname":"/pentesting-web/deserialization/java-dns-deserialization-and-gadgetprobe","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"Deserialization"}]},{"id":"k1J7YuzULsANdJby6E4T","title":"Basic Java Deserialization (ObjectInputStream, readObject)","pathname":"/pentesting-web/deserialization/basic-java-deserialization-objectinputstream-readobject","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"Deserialization"}]},{"id":"FsFz7nh7E1rNnLlCVL2f","title":"PHP - Deserialization + Autoload Classes","pathname":"/pentesting-web/deserialization/php-deserialization-+-autoload-classes","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"Deserialization"}]},{"id":"t9ui4KihbOZnRwbWUT5L","title":"CommonsCollection1 Payload - Java Transformers to Rutime exec() and Thread Sleep","pathname":"/pentesting-web/deserialization/java-transformers-to-rutime-exec-payload","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"Deserialization"}]},{"id":"vVDLHsHf9X1vHRrGW7bL","title":"Basic .Net deserialization (ObjectDataProvider gadget, ExpandedWrapper, and Json.Net)","pathname":"/pentesting-web/deserialization/basic-.net-deserialization-objectdataprovider-gadgets-expandedwrapper-and-json.net","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"Deserialization"}]},{"id":"lsBfwUVE6vlyyIhZgOV0","title":"Exploiting __VIEWSTATE knowing the secrets","pathname":"/pentesting-web/deserialization/exploiting-__viewstate-knowing-the-secret","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"Deserialization"}]},{"id":"MtMDGqtNiFioNSgRFdfy","title":"Exploiting __VIEWSTATE without knowing the secrets","pathname":"/pentesting-web/deserialization/exploiting-__viewstate-parameter","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"Deserialization"}]},{"id":"vvA8NuLNqrptYrB9BeH8","title":"Python Yaml Deserialization","pathname":"/pentesting-web/deserialization/python-yaml-deserialization","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"Deserialization"}]},{"id":"IgyMrCEtNsGnmGD7ym7o","title":"JNDI - Java Naming and Directory Interface & Log4Shell","pathname":"/pentesting-web/deserialization/jndi-java-naming-and-directory-interface-and-log4shell","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"Deserialization"}]},{"id":"iJD7zEJ6vlGAUNB8SK1Z","title":"Domain/Subdomain takeover","pathname":"/pentesting-web/domain-subdomain-takeover","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"aBEypF30CpY2QeQwj4Ee","title":"Email Injections","pathname":"/pentesting-web/email-injections","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"ULpIa8hwctY3VwsLiX9w","title":"File Inclusion/Path traversal","pathname":"/pentesting-web/file-inclusion","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"pFtSk8BifJ3qO6awESmk","title":"phar:// deserialization","pathname":"/pentesting-web/file-inclusion/phar-deserialization","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"File Inclusion/Path traversal"}]},{"id":"azLO7cmzoW6OPd79dgyT","title":"LFI2RCE via PHP Filters","pathname":"/pentesting-web/file-inclusion/lfi2rce-via-php-filters","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"File Inclusion/Path traversal"}]},{"id":"AJUm4boE9z8YyR8aP8Ml","title":"LFI2RCE via Nginx temp files","pathname":"/pentesting-web/file-inclusion/lfi2rce-via-nginx-temp-files","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"File Inclusion/Path traversal"}]},{"id":"5WNeczmkPtOFhU4PKXfa","title":"LFI2RCE via PHP_SESSION_UPLOAD_PROGRESS","pathname":"/pentesting-web/file-inclusion/via-php_session_upload_progress","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"File Inclusion/Path traversal"}]},{"id":"RhsFvFR1NmvBcLnvvvzw","title":"LFI2RCE via Segmentation Fault","pathname":"/pentesting-web/file-inclusion/lfi2rce-via-segmentation-fault","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"File Inclusion/Path traversal"}]},{"id":"KFJCklhgtYDiHrJHTJsK","title":"LFI2RCE via phpinfo()","pathname":"/pentesting-web/file-inclusion/lfi2rce-via-phpinfo","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"File Inclusion/Path traversal"}]},{"id":"ss6kG4jSNnDtyKBpIDJa","title":"LFI2RCE Via temp file uploads","pathname":"/pentesting-web/file-inclusion/lfi2rce-via-temp-file-uploads","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"File Inclusion/Path traversal"}]},{"id":"JmVm0JxAGxav4CHc0EDu","title":"LFI2RCE via Eternal waiting","pathname":"/pentesting-web/file-inclusion/lfi2rce-via-eternal-waiting","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"File Inclusion/Path traversal"}]},{"id":"jzWCxkLeyAcsB1AevNIf","title":"LFI2RCE Via compress.zlib + PHP_STREAM_PREFER_STUDIO + Path Disclosure","pathname":"/pentesting-web/file-inclusion/lfi2rce-via-compress.zlib-+-php_stream_prefer_studio-+-path-disclosure","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"File Inclusion/Path traversal"}]},{"id":"y88hjLd7mYlGemxk1Z67","title":"File Upload","pathname":"/pentesting-web/file-upload","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"WzJHNYA0NkdNpg8AHrxq","title":"PDF Upload - XXE and CORS bypass","pathname":"/pentesting-web/file-upload/pdf-upload-xxe-and-cors-bypass","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"File Upload"}]},{"id":"UprLuMpLokc63jL1ZVDS","title":"Formula/CSV/Doc/LaTeX/GhostScript Injection","pathname":"/pentesting-web/formula-csv-doc-latex-ghostscript-injection","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"6B5u4bQMagcVwyXkOIph","title":"gRPC-Web Pentest","pathname":"/pentesting-web/grpc-web-pentest","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"ebvSuzY1fCmeLtWTNoUZ","title":"HTTP Connection Contamination","pathname":"/pentesting-web/http-connection-contamination","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"ixfcTuCXqTrWnON7i8m9","title":"HTTP Connection Request Smuggling","pathname":"/pentesting-web/http-connection-request-smuggling","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"gSY9Wl8qDT62zuF9z6lu","title":"HTTP Request Smuggling / HTTP Desync Attack","pathname":"/pentesting-web/http-request-smuggling","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"SS4lIGXVJoqBjC6QXEDD","title":"Browser HTTP Request Smuggling","pathname":"/pentesting-web/http-request-smuggling/browser-http-request-smuggling","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"HTTP Request Smuggling / HTTP Desync Attack"}]},{"id":"9HrKhIvims2XCpGTF8Ke","title":"Request Smuggling in HTTP/2 Downgrades","pathname":"/pentesting-web/http-request-smuggling/request-smuggling-in-http-2-downgrades","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"HTTP Request Smuggling / HTTP Desync Attack"}]},{"id":"R0oFjhokmy0hUOZgtiIk","title":"HTTP Response Smuggling / Desync","pathname":"/pentesting-web/http-response-smuggling-desync","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"OLNJx4j6bzqIBBezjQV5","title":"Upgrade Header Smuggling","pathname":"/pentesting-web/h2c-smuggling","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"JYbS7PM6Wmt9lCFnP5Dl","title":"hop-by-hop headers","pathname":"/pentesting-web/abusing-hop-by-hop-headers","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"y8y7oiTGe5VBMCKqZAmt","title":"IDOR","pathname":"/pentesting-web/idor","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"EvaIXQNcreG59CwFBzjf","title":"Integer Overflow","pathname":"/pentesting-web/integer-overflow","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"8R6F5RdYQaB1x5ICSPXX","title":"JWT Vulnerabilities (Json Web Tokens)","pathname":"/pentesting-web/hacking-jwt-json-web-tokens","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"2SS8kC1qxAYeaGDzRLTq","title":"LDAP Injection","pathname":"/pentesting-web/ldap-injection","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"vDOjqJaOnkyrpChR5YMY","title":"Login Bypass","pathname":"/pentesting-web/login-bypass","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"6COsYFEz8UmoqQgoLk5N","title":"Login bypass List","pathname":"/pentesting-web/login-bypass/sql-login-bypass","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"Login Bypass"}]},{"id":"V7mNpgTCN8EiIxpbDFYM","title":"NoSQL injection","pathname":"/pentesting-web/nosql-injection","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"jhBAqe7AusIsQz7G3g87","title":"OAuth to Account takeover","pathname":"/pentesting-web/oauth-to-account-takeover","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"pLTkksCSaFRBsNiufD1l","title":"Open Redirect","pathname":"/pentesting-web/open-redirect","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"EEwcDBb9A0qbYNoxym6U","title":"Parameter Pollution","pathname":"/pentesting-web/parameter-pollution","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"GBfFqJVuHFOUEwUUT1YW","title":"Phone Number Injections","pathname":"/pentesting-web/phone-number-injections","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"4cVtCo7Y7JBwHY4oOl6C","title":"PostMessage Vulnerabilities","pathname":"/pentesting-web/postmessage-vulnerabilities","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"sAw9FfJCozu0mA3XbGKW","title":"Blocking main page to steal postmessage","pathname":"/pentesting-web/postmessage-vulnerabilities/blocking-main-page-to-steal-postmessage","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"PostMessage Vulnerabilities"}]},{"id":"QpftuAUv01zBQDgnB55H","title":"Bypassing SOP with Iframes - 1","pathname":"/pentesting-web/postmessage-vulnerabilities/bypassing-sop-with-iframes-1","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"PostMessage Vulnerabilities"}]},{"id":"JybHrk294foWtTfEaKGw","title":"Bypassing SOP with Iframes - 2","pathname":"/pentesting-web/postmessage-vulnerabilities/bypassing-sop-with-iframes-2","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"PostMessage Vulnerabilities"}]},{"id":"lDi4ysf2uwUGYqyFWMHg","title":"Steal postmessage modifying iframe location","pathname":"/pentesting-web/postmessage-vulnerabilities/steal-postmessage-modifying-iframe-location","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"PostMessage Vulnerabilities"}]},{"id":"asg3NT6I1CbuC1ngZmZ0","title":"Proxy / WAF Protections Bypass","pathname":"/pentesting-web/proxy-waf-protections-bypass","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"4ZsDSRxNqYh5K3QMdhOJ","title":"Race Condition","pathname":"/pentesting-web/race-condition","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"ivDv4Fd748ACalxIHTy8","title":"Rate Limit Bypass","pathname":"/pentesting-web/rate-limit-bypass","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"OrDreL2oyHafwdlnqeFs","title":"Registration & Takeover Vulnerabilities","pathname":"/pentesting-web/registration-vulnerabilities","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"ZQvVjwQLZzQpu0ChbMee","title":"Regular expression Denial of Service - ReDoS","pathname":"/pentesting-web/regular-expression-denial-of-service-redos","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"hFPZR5C1FeJPiXwA0Xyk","title":"Reset/Forgotten Password Bypass","pathname":"/pentesting-web/reset-password","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"WMOPGyNoFVCaEE1kKsQL","title":"SAML Attacks","pathname":"/pentesting-web/saml-attacks","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"z0mgxPsaCSLS655PLmWO","title":"SAML Basics","pathname":"/pentesting-web/saml-attacks/saml-basics","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"SAML Attacks"}]},{"id":"QyYpo3hpX09yxCKKDFPX","title":"Server Side Inclusion/Edge Side Inclusion Injection","pathname":"/pentesting-web/server-side-inclusion-edge-side-inclusion-injection","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"mrGU6fF9OFyCB8r5qxV3","title":"SQL Injection","pathname":"/pentesting-web/sql-injection","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"OJz3aZS8PAh0F2bnUx8f","title":"MS Access SQL Injection","pathname":"/pentesting-web/sql-injection/ms-access-sql-injection","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"SQL Injection"}]},{"id":"Zi70eK4B9gOlBFZ70NiO","title":"MSSQL Injection","pathname":"/pentesting-web/sql-injection/mssql-injection","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"SQL Injection"}]},{"id":"jCSuEDoI0P1FRn5ZD2Zz","title":"MySQL injection","pathname":"/pentesting-web/sql-injection/mysql-injection","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"SQL Injection"}]},{"id":"T1KK3AgmhFJC2lTzKl5L","title":"MySQL File priv to SSRF/RCE","pathname":"/pentesting-web/sql-injection/mysql-injection/mysql-ssrf","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"SQL Injection"},{"label":"MySQL injection"}]},{"id":"qcLWf5Enzi96CppnFtq1","title":"Oracle injection","pathname":"/pentesting-web/sql-injection/oracle-injection","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"SQL Injection"}]},{"id":"kA4ai9OS0n60RcLNNsKU","title":"Cypher Injection (neo4j)","pathname":"/pentesting-web/sql-injection/cypher-injection-neo4j","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"SQL Injection"}]},{"id":"gfxDYm5dcDPy0jcvBhkZ","title":"PostgreSQL injection","pathname":"/pentesting-web/sql-injection/postgresql-injection","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"SQL Injection"}]},{"id":"k6HR7nRtL97petc9FFHz","title":"dblink/lo_import data exfiltration","pathname":"/pentesting-web/sql-injection/postgresql-injection/dblink-lo_import-data-exfiltration","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"SQL Injection"},{"label":"PostgreSQL injection"}]},{"id":"yAZibhmDPk2aAljuCAyf","title":"PL/pgSQL Password Bruteforce","pathname":"/pentesting-web/sql-injection/postgresql-injection/pl-pgsql-password-bruteforce","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"SQL Injection"},{"label":"PostgreSQL injection"}]},{"id":"ab39DB9hGVNjI1zTGU3S","title":"Network - Privesc, Port Scanner and NTLM chanllenge response disclosure","pathname":"/pentesting-web/sql-injection/postgresql-injection/network-privesc-port-scanner-and-ntlm-chanllenge-response-disclosure","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"SQL Injection"},{"label":"PostgreSQL injection"}]},{"id":"HOjESSTx7WE5npyBMwmo","title":"Big Binary Files Upload (PostgreSQL)","pathname":"/pentesting-web/sql-injection/postgresql-injection/big-binary-files-upload-postgresql","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"SQL Injection"},{"label":"PostgreSQL injection"}]},{"id":"3YNhihqxHxMT8Tl1NBLc","title":"RCE with PostgreSQL Languages","pathname":"/pentesting-web/sql-injection/postgresql-injection/rce-with-postgresql-languages","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"SQL Injection"},{"label":"PostgreSQL injection"}]},{"id":"r2IRmWtkTMR3gKGs137x","title":"RCE with PostgreSQL Extensions","pathname":"/pentesting-web/sql-injection/postgresql-injection/rce-with-postgresql-extensions","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"SQL Injection"},{"label":"PostgreSQL injection"}]},{"id":"wE10sZ1UbjhMCD2jZKst","title":"SQLMap - Cheetsheat","pathname":"/pentesting-web/sql-injection/sqlmap","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"SQL Injection"}]},{"id":"uroEcra9pDDpDahO5aub","title":"Second Order Injection - SQLMap","pathname":"/pentesting-web/sql-injection/sqlmap/second-order-injection-sqlmap","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"SQL Injection"},{"label":"SQLMap - Cheetsheat"}]},{"id":"JGQKwlHvMnvAS2WYheiv","title":"SSRF (Server Side Request Forgery)","pathname":"/pentesting-web/ssrf-server-side-request-forgery","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"fPnVC5eoDyJcPSVXXoRf","title":"URL Format Bypass","pathname":"/pentesting-web/ssrf-server-side-request-forgery/url-format-bypass","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"SSRF (Server Side Request Forgery)"}]},{"id":"LuAHkQ5SINUNLZdpaXtn","title":"SSRF Vulnerable Platforms","pathname":"/pentesting-web/ssrf-server-side-request-forgery/ssrf-vulnerable-platforms","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"SSRF (Server Side Request Forgery)"}]},{"id":"e35egoEm41S0PylNeq6P","title":"Cloud SSRF","pathname":"/pentesting-web/ssrf-server-side-request-forgery/cloud-ssrf","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"SSRF (Server Side Request Forgery)"}]},{"id":"I15J1FRxxNxxjOJq1qXG","title":"SSTI (Server Side Template Injection)","pathname":"/pentesting-web/ssti-server-side-template-injection","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"s748lV6XlN3XKn6VrZBD","title":"EL - Expression Language","pathname":"/pentesting-web/ssti-server-side-template-injection/el-expression-language","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"SSTI (Server Side Template Injection)"}]},{"id":"F4GHSNlkDMFxOkabLEfP","title":"Jinja2 SSTI","pathname":"/pentesting-web/ssti-server-side-template-injection/jinja2-ssti","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"SSTI (Server Side Template Injection)"}]},{"id":"2tAPqAeuL5R52OoAz74r","title":"Reverse Tab Nabbing","pathname":"/pentesting-web/reverse-tab-nabbing","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"i8zqPbFYOGeHKEzY09m5","title":"Unicode Injection","pathname":"/pentesting-web/unicode-injection","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"i5C88ceIqzZR2f1RuVPY","title":"Unicode Normalization","pathname":"/pentesting-web/unicode-injection/unicode-normalization","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"Unicode Injection"}]},{"id":"wYQE7jR1NYuTJlCa3dRZ","title":"WebSocket Attacks","pathname":"/pentesting-web/websocket-attacks","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"K2ok1aatSiimLQQJEU66","title":"Web Tool - WFuzz","pathname":"/pentesting-web/web-tool-wfuzz","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"dU5f8Kq0efrxYVSpiahV","title":"XPATH injection","pathname":"/pentesting-web/xpath-injection","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"41KHla2xZW3p39sBngzm","title":"XSLT Server Side Injection (Extensible Stylesheet Language Transformations)","pathname":"/pentesting-web/xslt-server-side-injection-extensible-stylesheet-language-transformations","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"RZZTQXQfM9ggAi7LTkjO","title":"XXE - XEE - XML External Entity","pathname":"/pentesting-web/xxe-xee-xml-external-entity","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"T9edtFidsjeu6veryMKx","title":"XSS (Cross Site Scripting)","pathname":"/pentesting-web/xss-cross-site-scripting","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"nPhNXrtEgm4vEVEBa9Eg","title":"Abusing Service Workers","pathname":"/pentesting-web/xss-cross-site-scripting/abusing-service-workers","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"XSS (Cross Site Scripting)"}]},{"id":"BnoUbx3s04DyJScbgCBP","title":"Chrome Cache to XSS","pathname":"/pentesting-web/xss-cross-site-scripting/chrome-cache-to-xss","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"XSS (Cross Site Scripting)"}]},{"id":"nLBgTBBxH7YTKdQEce7n","title":"Debugging Client Side JS","pathname":"/pentesting-web/xss-cross-site-scripting/debugging-client-side-js","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"XSS (Cross Site Scripting)"}]},{"id":"aX5LndYiCzrlYCN4dlJ7","title":"Dom Clobbering","pathname":"/pentesting-web/xss-cross-site-scripting/dom-clobbering","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"XSS (Cross Site Scripting)"}]},{"id":"9yQPbkYBUEQUAJDmIJMK","title":"DOM Invader","pathname":"/pentesting-web/xss-cross-site-scripting/dom-invader","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"XSS (Cross Site Scripting)"}]},{"id":"Bk5rDyYKri0cNzknLDZF","title":"DOM XSS","pathname":"/pentesting-web/xss-cross-site-scripting/dom-xss","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"XSS (Cross Site Scripting)"}]},{"id":"W5uqCSjeChPvdnS8NVV3","title":"Iframes in XSS, CSP and SOP","pathname":"/pentesting-web/xss-cross-site-scripting/iframes-in-xss-and-csp","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"XSS (Cross Site Scripting)"}]},{"id":"9N2xtvQL1xXdK39SvhBT","title":"JS Hoisting","pathname":"/pentesting-web/xss-cross-site-scripting/js-hoisting","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"XSS (Cross Site Scripting)"}]},{"id":"lG6b9rqurJNAC6SVwJEY","title":"Misc JS Tricks & Relevant Info","pathname":"/pentesting-web/xss-cross-site-scripting/other-js-tricks","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"XSS (Cross Site Scripting)"}]},{"id":"PyzWtkgks58MnLiArJSi","title":"PDF Injection","pathname":"/pentesting-web/xss-cross-site-scripting/pdf-injection","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"XSS (Cross Site Scripting)"}]},{"id":"dFFXjIriMKgKGW5qCsaw","title":"Server Side XSS (Dynamic PDF)","pathname":"/pentesting-web/xss-cross-site-scripting/server-side-xss-dynamic-pdf","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"XSS (Cross Site Scripting)"}]},{"id":"rgBXObCVjUjO7tWriaSA","title":"Shadow DOM","pathname":"/pentesting-web/xss-cross-site-scripting/shadow-dom","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"XSS (Cross Site Scripting)"}]},{"id":"nMXlZAJ5jvr9fobTwhDs","title":"SOME - Same Origin Method Execution","pathname":"/pentesting-web/xss-cross-site-scripting/some-same-origin-method-execution","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"XSS (Cross Site Scripting)"}]},{"id":"HApX1D8T1m4Jsl3Fk4bK","title":"Sniff Leak","pathname":"/pentesting-web/xss-cross-site-scripting/sniff-leak","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"XSS (Cross Site Scripting)"}]},{"id":"6IbhtbkL5scE8Bcccv94","title":"Steal Info JS","pathname":"/pentesting-web/xss-cross-site-scripting/steal-info-js","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"XSS (Cross Site Scripting)"}]},{"id":"owIQNk71GkswoxPr98ee","title":"XSS in Markdown","pathname":"/pentesting-web/xss-cross-site-scripting/xss-in-markdown","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"XSS (Cross Site Scripting)"}]},{"id":"6bVTv57sSTEGmtITbuRQ","title":"XSSI (Cross-Site Script Inclusion)","pathname":"/pentesting-web/xssi-cross-site-script-inclusion","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"yW4lc8VGOtX92OeIXFoK","title":"XS-Search/XS-Leaks","pathname":"/pentesting-web/xs-search","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"DtOz563IK8DKJLbKlTH4","title":"Connection Pool Examples","pathname":"/pentesting-web/xs-search/connection-pool-example","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"XS-Search/XS-Leaks"}]},{"id":"2nSdLOqnSijYkp6DJy70","title":"Connection Pool by Destination Example","pathname":"/pentesting-web/xs-search/connection-pool-by-destination-example","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"XS-Search/XS-Leaks"}]},{"id":"f2ThEWxP4DbhfaAMofBQ","title":"Cookie Bomb + Onerror XS Leak","pathname":"/pentesting-web/xs-search/cookie-bomb-+-onerror-xs-leak","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"XS-Search/XS-Leaks"}]},{"id":"Yz8JLye7Xis0kq8HPrZs","title":"URL Max Length - Client Side","pathname":"/pentesting-web/xs-search/url-max-length-client-side","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"XS-Search/XS-Leaks"}]},{"id":"X6NNUH7G2E5W3JmFuzRG","title":"performance.now example","pathname":"/pentesting-web/xs-search/performance.now-example","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"XS-Search/XS-Leaks"}]},{"id":"iH5SplNcy71pC0RFBaWe","title":"performance.now + Force heavy task","pathname":"/pentesting-web/xs-search/performance.now-+-force-heavy-task","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"XS-Search/XS-Leaks"}]},{"id":"HyAKmjBfRDnKy9Ynyjb2","title":"Event Loop Blocking + Lazy images","pathname":"/pentesting-web/xs-search/event-loop-blocking-+-lazy-images","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"XS-Search/XS-Leaks"}]},{"id":"tfiONcdKcA10a0mcDCTg","title":"JavaScript Execution XS Leak","pathname":"/pentesting-web/xs-search/javascript-execution-xs-leak","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"XS-Search/XS-Leaks"}]},{"id":"71mMrdzqG5Yvhzen801e","title":"CSS Injection","pathname":"/pentesting-web/xs-search/css-injection","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"XS-Search/XS-Leaks"}]},{"id":"SevIuc5Qdd8860kaa7kR","title":"CSS Injection Code","pathname":"/pentesting-web/xs-search/css-injection/css-injection-code","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"},{"label":"XS-Search/XS-Leaks"},{"label":"CSS Injection"}]},{"id":"EiTjJhCwWP3KpsAhFM1L","title":"Physical Attacks","pathname":"/hardware-physical-access/physical-attacks","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Hardware/Physical Access","emoji":"1f60e"}]},{"id":"GhlIR4g7gnSbPeAnV8PH","title":"Escaping from KIOSKs","pathname":"/hardware-physical-access/escaping-from-gui-applications","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Hardware/Physical Access","emoji":"1f60e"}]},{"id":"gnFLsCyksYuyiw9hWIgj","title":"Firmware Analysis","pathname":"/hardware-physical-access/firmware-analysis","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Hardware/Physical Access","emoji":"1f60e"}]},{"id":"sr0Eau4YwsTtqKfKpn06","title":"Bootloader testing","pathname":"/hardware-physical-access/firmware-analysis/bootloader-testing","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Hardware/Physical Access","emoji":"1f60e"},{"label":"Firmware Analysis"}]},{"id":"IOY8GMfmKWdgv7ix6vpm","title":"Firmware Integrity","pathname":"/hardware-physical-access/firmware-analysis/firmware-integrity","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Hardware/Physical Access","emoji":"1f60e"},{"label":"Firmware Analysis"}]},{"id":"ASMeD0vTWf32K8Limajy","title":"Basic Binary Exploitation Methodology","pathname":"/binary-exploitation/basic-binary-exploitation-methodology","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"}]},{"id":"NnEBNleuKN6Lh6WedY6A","title":"ELF Basic Information","pathname":"/binary-exploitation/basic-binary-exploitation-methodology/elf-tricks","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"},{"label":"Basic Binary Exploitation Methodology"}]},{"id":"1BOELPUCKAOg0cwIcEit","title":"Exploiting Tools","pathname":"/binary-exploitation/basic-binary-exploitation-methodology/tools","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"},{"label":"Basic Binary Exploitation Methodology"}]},{"id":"kwDTqmSX6mSJTBJn4oev","title":"PwnTools","pathname":"/binary-exploitation/basic-binary-exploitation-methodology/tools/pwntools","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"},{"label":"Basic Binary Exploitation Methodology"},{"label":"Exploiting Tools"}]},{"id":"eUBx8K9ZiYsaNaF0dRz1","title":"Stack Overflow","pathname":"/binary-exploitation/stack-overflow","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"}]},{"id":"2JV5HgvbkeQHd5RLGKcq","title":"Pointer Redirecting","pathname":"/binary-exploitation/stack-overflow/pointer-redirecting","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"},{"label":"Stack Overflow"}]},{"id":"8qsMraFk9He90g2ylKea","title":"Ret2win","pathname":"/binary-exploitation/stack-overflow/ret2win","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"},{"label":"Stack Overflow"}]},{"id":"EHNZLmGYxIjC7TklXT7s","title":"Ret2win - arm64","pathname":"/binary-exploitation/stack-overflow/ret2win/ret2win-arm64","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"},{"label":"Stack Overflow"},{"label":"Ret2win"}]},{"id":"nqDthHBB9p7EP42JMQCs","title":"Stack Shellcode","pathname":"/binary-exploitation/stack-overflow/stack-shellcode","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"},{"label":"Stack Overflow"}]},{"id":"moGJVEW4yIqcjxYNOCRc","title":"Stack Shellcode - arm64","pathname":"/binary-exploitation/stack-overflow/stack-shellcode/stack-shellcode-arm64","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"},{"label":"Stack Overflow"},{"label":"Stack Shellcode"}]},{"id":"mfM13EhzcPx6nptuPs1q","title":"Stack Pivoting - EBP2Ret - EBP chaining","pathname":"/binary-exploitation/stack-overflow/stack-pivoting-ebp2ret-ebp-chaining","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"},{"label":"Stack Overflow"}]},{"id":"fBEeUYMaecRs25TLVDCq","title":"Uninitialized Variables","pathname":"/binary-exploitation/stack-overflow/uninitialized-variables","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"},{"label":"Stack Overflow"}]},{"id":"gemD81kdHXO6tdFTCyuX","title":"ROP - Return Oriented Programing","pathname":"/binary-exploitation/rop-return-oriented-programing","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"}]},{"id":"VIpBoCGw8xMFOJTh5UaW","title":"BROP - Blind Return Oriented Programming","pathname":"/binary-exploitation/rop-return-oriented-programing/brop-blind-return-oriented-programming","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"},{"label":"ROP - Return Oriented Programing"}]},{"id":"4L3O8kcAaWlJD0gW2bLL","title":"Ret2csu","pathname":"/binary-exploitation/rop-return-oriented-programing/ret2csu","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"},{"label":"ROP - Return Oriented Programing"}]},{"id":"eBE0Dioxkj4QSjz5IJOL","title":"Ret2dlresolve","pathname":"/binary-exploitation/rop-return-oriented-programing/ret2dlresolve","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"},{"label":"ROP - Return Oriented Programing"}]},{"id":"SbxlaAdeDwpO0QlLy594","title":"Ret2esp / Ret2reg","pathname":"/binary-exploitation/rop-return-oriented-programing/ret2esp-ret2reg","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"},{"label":"ROP - Return Oriented Programing"}]},{"id":"GLPNs0jVOGEgPvB45FtZ","title":"Ret2lib","pathname":"/binary-exploitation/rop-return-oriented-programing/ret2lib","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"},{"label":"ROP - Return Oriented Programing"}]},{"id":"aFuO4GQvo3JtmueucSRy","title":"Leaking libc address with ROP","pathname":"/binary-exploitation/rop-return-oriented-programing/ret2lib/rop-leaking-libc-address","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"},{"label":"ROP - Return Oriented Programing"},{"label":"Ret2lib"}]},{"id":"LrDIer52nq3ZG2Q033WS","title":"Leaking libc - template","pathname":"/binary-exploitation/rop-return-oriented-programing/ret2lib/rop-leaking-libc-address/rop-leaking-libc-template","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"},{"label":"ROP - Return Oriented Programing"},{"label":"Ret2lib"},{"label":"Leaking libc address with ROP"}]},{"id":"hMN26nDJfPq1mKoWI7qN","title":"One Gadget","pathname":"/binary-exploitation/rop-return-oriented-programing/ret2lib/one-gadget","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"},{"label":"ROP - Return Oriented Programing"},{"label":"Ret2lib"}]},{"id":"7yUDuH8IzyIc3AMs8iYB","title":"Ret2lib + Printf leak - arm64","pathname":"/binary-exploitation/rop-return-oriented-programing/ret2lib/ret2lib-+-printf-leak-arm64","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"},{"label":"ROP - Return Oriented Programing"},{"label":"Ret2lib"}]},{"id":"UZaS3Vpd4JlAp5RAN7gB","title":"Ret2syscall","pathname":"/binary-exploitation/rop-return-oriented-programing/rop-syscall-execv","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"},{"label":"ROP - Return Oriented Programing"}]},{"id":"8oMPkRd1kv8nHaHlnx4Z","title":"Ret2syscall - ARM64","pathname":"/binary-exploitation/rop-return-oriented-programing/rop-syscall-execv/ret2syscall-arm64","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"},{"label":"ROP - Return Oriented Programing"},{"label":"Ret2syscall"}]},{"id":"j5wfYP2cd0exEHZeDmyL","title":"Ret2vDSO","pathname":"/binary-exploitation/rop-return-oriented-programing/ret2vdso","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"},{"label":"ROP - Return Oriented Programing"}]},{"id":"LF8PPQZOVMutTi64qfqx","title":"SROP - Sigreturn-Oriented Programming","pathname":"/binary-exploitation/rop-return-oriented-programing/srop-sigreturn-oriented-programming","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"},{"label":"ROP - Return Oriented Programing"}]},{"id":"F5i5Tm54yIL5OfTR6BkG","title":"SROP - ARM64","pathname":"/binary-exploitation/rop-return-oriented-programing/srop-sigreturn-oriented-programming/srop-arm64","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"},{"label":"ROP - Return Oriented Programing"},{"label":"SROP - Sigreturn-Oriented Programming"}]},{"id":"rukLzn8yxtYl6IFeYXq0","title":"Array Indexing","pathname":"/binary-exploitation/array-indexing","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"}]},{"id":"dwySYThwS46bKmSpb7UZ","title":"Integer Overflow","pathname":"/binary-exploitation/integer-overflow","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"}]},{"id":"fUhYVeVSbW2DmpvMZwxx","title":"Format Strings","pathname":"/binary-exploitation/format-strings","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"}]},{"id":"8R9z5UwzJGFKNyOpLVPX","title":"Format Strings - Arbitrary Read Example","pathname":"/binary-exploitation/format-strings/format-strings-arbitrary-read-example","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"},{"label":"Format Strings"}]},{"id":"fyEfUc5FNj0qlgljFoms","title":"Format Strings Template","pathname":"/binary-exploitation/format-strings/format-strings-template","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"},{"label":"Format Strings"}]},{"id":"hpOavKRm74143MWytikM","title":"Heap","pathname":"/binary-exploitation/heap","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"}]},{"id":"CruKUXsubb6WEpSFTz9n","title":"Use After Free","pathname":"/binary-exploitation/heap/use-after-free","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"},{"label":"Heap"}]},{"id":"jv878PihVKeQNTX1OaBy","title":"Heap Overflow","pathname":"/binary-exploitation/heap/heap-overflow","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"},{"label":"Heap"}]},{"id":"8EHixA2mfb0TuGktwJ9q","title":"Common Binary Exploitation Protections & Bypasses","pathname":"/binary-exploitation/common-binary-protections-and-bypasses","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"}]},{"id":"sXInzKT3SRUNB6FxRWP4","title":"ASLR","pathname":"/binary-exploitation/common-binary-protections-and-bypasses/aslr","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"},{"label":"Common Binary Exploitation Protections & Bypasses"}]},{"id":"yDCsx3rxJkYtecDY199h","title":"Ret2plt","pathname":"/binary-exploitation/common-binary-protections-and-bypasses/aslr/ret2plt","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"},{"label":"Common Binary Exploitation Protections & Bypasses"},{"label":"ASLR"}]},{"id":"BJGXsAziS4RgiKQPamQT","title":"Ret2ret & Reo2pop","pathname":"/binary-exploitation/common-binary-protections-and-bypasses/aslr/ret2ret","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"},{"label":"Common Binary Exploitation Protections & Bypasses"},{"label":"ASLR"}]},{"id":"O9cZKasSNnlIUXEMiH0G","title":"CET & Shadow Stack","pathname":"/binary-exploitation/common-binary-protections-and-bypasses/cet-and-shadow-stack","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"},{"label":"Common Binary Exploitation Protections & Bypasses"}]},{"id":"qOtUt91a53xYreVpaoJg","title":"Libc Protections","pathname":"/binary-exploitation/common-binary-protections-and-bypasses/libc-protections","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"},{"label":"Common Binary Exploitation Protections & Bypasses"}]},{"id":"9xOh5OeYiawlGahvOFEW","title":"Memory Tagging Extension (MTE)","pathname":"/binary-exploitation/common-binary-protections-and-bypasses/memory-tagging-extension-mte","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"},{"label":"Common Binary Exploitation Protections & Bypasses"}]},{"id":"NsMVbnv6FnkervFaHoDj","title":"No-exec / NX","pathname":"/binary-exploitation/common-binary-protections-and-bypasses/no-exec-nx","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"},{"label":"Common Binary Exploitation Protections & Bypasses"}]},{"id":"cTEhjg0GpWM477riDWkZ","title":"PIE","pathname":"/binary-exploitation/common-binary-protections-and-bypasses/pie","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"},{"label":"Common Binary Exploitation Protections & Bypasses"}]},{"id":"JL6xNtBNxPvcnpcZB7Gn","title":"BF Addresses in the Stack","pathname":"/binary-exploitation/common-binary-protections-and-bypasses/pie/bypassing-canary-and-pie","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"},{"label":"Common Binary Exploitation Protections & Bypasses"},{"label":"PIE"}]},{"id":"sDxwBoOGdi7QlAj3Cd46","title":"Relro","pathname":"/binary-exploitation/common-binary-protections-and-bypasses/relro","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"},{"label":"Common Binary Exploitation Protections & Bypasses"}]},{"id":"WEIsauwKQgnkncNCLRi0","title":"Stack Canaries","pathname":"/binary-exploitation/common-binary-protections-and-bypasses/stack-canaries","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"},{"label":"Common Binary Exploitation Protections & Bypasses"}]},{"id":"Ltdyz7aZqirRFXPIRi9D","title":"BF Forked & Threaded Stack Canaries","pathname":"/binary-exploitation/common-binary-protections-and-bypasses/stack-canaries/bf-forked-stack-canaries","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"},{"label":"Common Binary Exploitation Protections & Bypasses"},{"label":"Stack Canaries"}]},{"id":"Ku9GhhnJVXURmq3DZr2B","title":"Print Stack Canary","pathname":"/binary-exploitation/common-binary-protections-and-bypasses/stack-canaries/print-stack-canary","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"},{"label":"Common Binary Exploitation Protections & Bypasses"},{"label":"Stack Canaries"}]},{"id":"rIZLlvCnHtE5McjxMfgX","title":"Write What Where 2 Exec","pathname":"/binary-exploitation/write-what-where-2-exec","siteSpaceId":"sitesp_GuHT9","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"}]},{"id":"tvQHOYMKGtyZdwUei2yZ","title":"WWW2Exec - atexit()","pathname":"/binary-exploitation/write-what-where-2-exec/www2exec-atexit","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"},{"label":"Write What Where 2 Exec"}]},{"id":"tfh8CUlhc2U2mMBz6v2h","title":"WWW2Exec - .dtors & .fini_array","pathname":"/binary-exploitation/write-what-where-2-exec/www2exec-.dtors-and-.fini_array","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"},{"label":"Write What Where 2 Exec"}]},{"id":"O7IDeuESEww5Ab7GRgfx","title":"WWW2Exec - GOT/PLT","pathname":"/binary-exploitation/write-what-where-2-exec/aw2exec-got-plt","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"},{"label":"Write What Where 2 Exec"}]},{"id":"u5UVnv1ogtDd9WHlOv6j","title":"WWW2Exec - __malloc_hook","pathname":"/binary-exploitation/write-what-where-2-exec/aw2exec-__malloc_hook","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"},{"label":"Write What Where 2 Exec"}]},{"id":"MCHsZXKcXUrnhIzCqr2M","title":"Common Exploiting Problems","pathname":"/binary-exploitation/common-exploiting-problems","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"}]},{"id":"rKJfDYRjTeCVSdrDbdHD","title":"Windows Exploiting (Basic Guide - OSCP lvl)","pathname":"/binary-exploitation/windows-exploiting-basic-guide-oscp-lvl","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"}]},{"id":"xnPC45ZGbIHnvCcrkDXI","title":"Linux Exploiting (Basic) (SPA)","pathname":"/binary-exploitation/linux-exploiting-basic-spa","siteSpaceId":"sitesp_GuHT9","breadcrumbs":[{"label":"Binary Exploitation","emoji":"1f3af"}]},{"id":"dpdeGVYh87e7nLBedZ9v","title":"Reversing Tools & Basic Methods","pathname":"/reversing/reversing-tools-basic-methods","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Reversing","emoji":"1f529"}]},{"id":"VI50bJRO51u77iYKD57O","title":"Angr","pathname":"/reversing/reversing-tools-basic-methods/angr","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Reversing","emoji":"1f529"},{"label":"Reversing Tools & Basic Methods"}]},{"id":"yUimYKT2JCL7NEz7wGY0","title":"Angr - Examples","pathname":"/reversing/reversing-tools-basic-methods/angr/angr-examples","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Reversing","emoji":"1f529"},{"label":"Reversing Tools & Basic Methods"},{"label":"Angr"}]},{"id":"9H32Qq5HM9a3xIyQu4vU","title":"Z3 - Satisfiability Modulo Theories (SMT)","pathname":"/reversing/reversing-tools-basic-methods/satisfiability-modulo-theories-smt-z3","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Reversing","emoji":"1f529"},{"label":"Reversing Tools & Basic Methods"}]},{"id":"y2DeqQuA2Pt6Cx4c2UXH","title":"Cheat Engine","pathname":"/reversing/reversing-tools-basic-methods/cheat-engine","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Reversing","emoji":"1f529"},{"label":"Reversing Tools & Basic Methods"}]},{"id":"o2niyD7tlqAYwivH8NqA","title":"Blobrunner","pathname":"/reversing/reversing-tools-basic-methods/blobrunner","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Reversing","emoji":"1f529"},{"label":"Reversing Tools & Basic Methods"}]},{"id":"z16NhZnGRuNAXy0YSFb1","title":"Common API used in Malware","pathname":"/reversing/common-api-used-in-malware","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Reversing","emoji":"1f529"}]},{"id":"TWm3f4nSCgJ1fM56zna5","title":"Word Macros","pathname":"/reversing/word-macros","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Reversing","emoji":"1f529"}]},{"id":"sjps2LYk2dm01pJNO6jR","title":"Cryptographic/Compression Algorithms","pathname":"/crypto-and-stego/cryptographic-algorithms","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Crypto & Stego","emoji":"1f52e"}]},{"id":"JFqFEtXwYIs5U4ydvfTN","title":"Unpacking binaries","pathname":"/crypto-and-stego/cryptographic-algorithms/unpacking-binaries","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Crypto & Stego","emoji":"1f52e"},{"label":"Cryptographic/Compression Algorithms"}]},{"id":"D6LcxhKRIzPWnCfmXWTm","title":"Certificates","pathname":"/crypto-and-stego/certificates","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Crypto & Stego","emoji":"1f52e"}]},{"id":"nWRMahPj3aK7pdJh9iXZ","title":"Cipher Block Chaining CBC-MAC","pathname":"/crypto-and-stego/cipher-block-chaining-cbc-mac-priv","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Crypto & Stego","emoji":"1f52e"}]},{"id":"RxY8otGX0KFE5eyQqr3g","title":"Crypto CTFs Tricks","pathname":"/crypto-and-stego/crypto-ctfs-tricks","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Crypto & Stego","emoji":"1f52e"}]},{"id":"uomoDZIztXFwYl5ZTgUl","title":"Electronic Code Book (ECB)","pathname":"/crypto-and-stego/electronic-code-book-ecb","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Crypto & Stego","emoji":"1f52e"}]},{"id":"ZtywiIUp9Ah1UACcnQHX","title":"Hash Length Extension Attack","pathname":"/crypto-and-stego/hash-length-extension-attack","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Crypto & Stego","emoji":"1f52e"}]},{"id":"pVizQyu0oG6z0cYitYI9","title":"Padding Oracle","pathname":"/crypto-and-stego/padding-oracle-priv","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Crypto & Stego","emoji":"1f52e"}]},{"id":"sSgMSSKmezpsBftMbcEj","title":"RC4 - Encrypt&Decrypt","pathname":"/crypto-and-stego/rc4-encrypt-and-decrypt","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Crypto & Stego","emoji":"1f52e"}]},{"id":"4BDA7RH9EWW4MYJ9rCO4","title":"Stego Tricks","pathname":"/crypto-and-stego/stego-tricks","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Crypto & Stego","emoji":"1f52e"}]},{"id":"hTuuAd2Wp45s6Hr2HQSW","title":"Esoteric languages","pathname":"/crypto-and-stego/esoteric-languages","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Crypto & Stego","emoji":"1f52e"}]},{"id":"lRc5rT7UiDDxF7pKCdY7","title":"Blockchain & Crypto Currencies","pathname":"/crypto-and-stego/blockchain-and-crypto-currencies","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"Crypto & Stego","emoji":"1f52e"}]},{"id":"UJLG94v2AYhS7zGHcrP8","title":"Salseo","pathname":"/c2/salseo","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"C2","emoji":"1f982"}]},{"id":"IIGdRux41pXDFujqHqB8","title":"ICMPsh","pathname":"/c2/icmpsh","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"C2","emoji":"1f982"}]},{"id":"IJYXgXmr70qClrDViMzM","title":"Cobalt Strike","pathname":"/c2/cobalt-strike","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"C2","emoji":"1f982"}]},{"id":"TVZHmpnpWt21KE9wII0A","title":"Other Big References","pathname":"/todo/references","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"TODO","emoji":"270d"}]},{"id":"wHEK9AtfksikUEC4uiru","title":"Rust Basics","pathname":"/todo/rust-basics","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"TODO","emoji":"270d"}]},{"id":"t5KEpxHR8JgdCh7EtmD7","title":"More Tools","pathname":"/todo/more-tools","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"TODO","emoji":"270d"}]},{"id":"zZ86WBF91ePgjPFZyQp2","title":"MISC","pathname":"/todo/misc","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"TODO","emoji":"270d"}]},{"id":"tOwnidgwGWmAJfkkUqPa","title":"Pentesting DNS","pathname":"/todo/pentesting-dns","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"TODO","emoji":"270d"}]},{"id":"b4mp5wiWpJqVJis3qSCF","title":"Hardware Hacking","pathname":"/todo/hardware-hacking","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"TODO","emoji":"270d"}]},{"id":"fHPUATM8rsMWxzF9SPiX","title":"I2C","pathname":"/todo/hardware-hacking/i2c","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"TODO","emoji":"270d"},{"label":"Hardware Hacking"}]},{"id":"kaFKUjs0a93PrQbFAjVS","title":"UART","pathname":"/todo/hardware-hacking/uart","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"TODO","emoji":"270d"},{"label":"Hardware Hacking"}]},{"id":"IJnnIrVCzobqIkaH894N","title":"Radio","pathname":"/todo/hardware-hacking/radio","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"TODO","emoji":"270d"},{"label":"Hardware Hacking"}]},{"id":"larokwMRvGbJkbWnFPom","title":"JTAG","pathname":"/todo/hardware-hacking/jtag","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"TODO","emoji":"270d"},{"label":"Hardware Hacking"}]},{"id":"84BSRjtRzwBmkLXPoHJy","title":"SPI","pathname":"/todo/hardware-hacking/spi","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"TODO","emoji":"270d"},{"label":"Hardware Hacking"}]},{"id":"g65sDhCWXgJWvGQ9Dxwd","title":"Radio Hacking","pathname":"/todo/radio-hacking","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"TODO","emoji":"270d"}]},{"id":"VFtBG4Mjn9ddvr6OIzVi","title":"Pentesting RFID","pathname":"/todo/radio-hacking/pentesting-rfid","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"TODO","emoji":"270d"},{"label":"Radio Hacking"}]},{"id":"QpA0hg1FhxN0Rwbvnwnj","title":"Infrared","pathname":"/todo/radio-hacking/infrared","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"TODO","emoji":"270d"},{"label":"Radio Hacking"}]},{"id":"Q5FBYuM0Ni4WwTWD321f","title":"Sub-GHz RF","pathname":"/todo/radio-hacking/sub-ghz-rf","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"TODO","emoji":"270d"},{"label":"Radio Hacking"}]},{"id":"2Sz9qsXOxuZncImVybIa","title":"iButton","pathname":"/todo/radio-hacking/ibutton","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"TODO","emoji":"270d"},{"label":"Radio Hacking"}]},{"id":"Mo3E85y4i0DejgQ2jqxk","title":"Flipper Zero","pathname":"/todo/radio-hacking/flipper-zero","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"TODO","emoji":"270d"},{"label":"Radio Hacking"}]},{"id":"Oouf8nsWmDLUKvZ7sMmt","title":"FZ - NFC","pathname":"/todo/radio-hacking/flipper-zero/fz-nfc","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"TODO","emoji":"270d"},{"label":"Radio Hacking"},{"label":"Flipper Zero"}]},{"id":"vaB58Iih9gZVGbSl46DW","title":"FZ - Sub-GHz","pathname":"/todo/radio-hacking/flipper-zero/fz-sub-ghz","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"TODO","emoji":"270d"},{"label":"Radio Hacking"},{"label":"Flipper Zero"}]},{"id":"EykQAHZze62yLVfIgzFU","title":"FZ - Infrared","pathname":"/todo/radio-hacking/flipper-zero/fz-infrared","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"TODO","emoji":"270d"},{"label":"Radio Hacking"},{"label":"Flipper Zero"}]},{"id":"5Lg2eVQe5fIHcgNPymaP","title":"FZ - iButton","pathname":"/todo/radio-hacking/flipper-zero/fz-ibutton","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"TODO","emoji":"270d"},{"label":"Radio Hacking"},{"label":"Flipper Zero"}]},{"id":"PX1j6KxiqTLbk4q8ARyt","title":"FZ - 125kHz RFID","pathname":"/todo/radio-hacking/flipper-zero/fz-125khz-rfid","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"TODO","emoji":"270d"},{"label":"Radio Hacking"},{"label":"Flipper Zero"}]},{"id":"SrUwvmNkKyiZeSzo6Qoo","title":"Proxmark 3","pathname":"/todo/radio-hacking/proxmark-3","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"TODO","emoji":"270d"},{"label":"Radio Hacking"}]},{"id":"kFOv7ZWqqDyGBCOWmd6H","title":"FISSURE - The RF Framework","pathname":"/todo/radio-hacking/fissure-the-rf-framework","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"TODO","emoji":"270d"},{"label":"Radio Hacking"}]},{"id":"oajNL3D57AlRSXQvVETd","title":"Low-Power Wide Area Network","pathname":"/todo/radio-hacking/low-power-wide-area-network","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"TODO","emoji":"270d"},{"label":"Radio Hacking"}]},{"id":"4HVwBOTpIigzW2CPiSah","title":"Pentesting BLE - Bluetooth Low Energy","pathname":"/todo/radio-hacking/pentesting-ble-bluetooth-low-energy","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"TODO","emoji":"270d"},{"label":"Radio Hacking"}]},{"id":"BRf6LCqOKOvNhgOPHt3h","title":"Industrial Control Systems Hacking","pathname":"/todo/industrial-control-systems-hacking","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"TODO","emoji":"270d"}]},{"id":"jwCaibldcJe8cS39FoH8","title":"Burp Suite","pathname":"/todo/burp-suite","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"TODO","emoji":"270d"}]},{"id":"lxKmytIdHNuDEDh8syp8","title":"Other Web Tricks","pathname":"/todo/other-web-tricks","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"TODO","emoji":"270d"}]},{"id":"ji4z9VgRbJ8WMcmsGn2E","title":"Interesting HTTP","pathname":"/todo/interesting-http","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"TODO","emoji":"270d"}]},{"id":"FtPKYlhLtRH6fPnDhjPr","title":"Emails Vulnerabilities","pathname":"/todo/emails-vulns","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"TODO","emoji":"270d"}]},{"id":"Mhuqoqa49eLGgUZ4CIAT","title":"Android Forensics","pathname":"/todo/android-forensics","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"TODO","emoji":"270d"}]},{"id":"yahAadlTKIJuhwKphEr6","title":"TR-069","pathname":"/todo/tr-069","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"TODO","emoji":"270d"}]},{"id":"b5fXiQS2eq0LKgsgVLpD","title":"6881/udp - Pentesting BitTorrent","pathname":"/todo/6881-udp-pentesting-bittorrent","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"TODO","emoji":"270d"}]},{"id":"cR7tdjM4CZiBhHhCL8ss","title":"Online Platforms with API","pathname":"/todo/online-platforms-with-api","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"TODO","emoji":"270d"}]},{"id":"8ESFSOkQ1OWxwCHepbLx","title":"Stealing Sensitive Information Disclosure from a Web","pathname":"/todo/stealing-sensitive-information-disclosure-from-a-web","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"TODO","emoji":"270d"}]},{"id":"QxVGYXNRD9UIM7DGVBvV","title":"Post Exploitation","pathname":"/todo/post-exploitation","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"TODO","emoji":"270d"}]},{"id":"yluRyoqhMsyKca313CDl","title":"Cookies Policy","pathname":"/todo/cookies-policy","siteSpaceId":"sitesp_GuHT9","description":"","breadcrumbs":[{"label":"TODO","emoji":"270d"}]}]}