Articles

  • Jan 17, 2025 | medium.com | Aman Chauhan

    Aman Chauhan·Follow2 min read·--Databases can also be stored as files, and these are referred to as “flat-file databases”The most common (and simplest) format of a flat-file database is an SQLite database. The client application for interacting with SQLite databases is sqlite3, which comes pre-installed on Kali Linux. You can download this sample webapp.db file from this link. As you can see i have a backup.db file.

  • Nov 23, 2024 | medium.com | Aman Chauhan

    Aman Chauhan·Follow6 min read·--Daily Bugle BannerDaily Bugle is an amazing tryhackme room that focuses on Joomla CMS (content management system) and SQL Injection. It also include some password cracking and privilege escalation techniques in a linux environment. Let’s catch the spidermannnnn!!!!!!!First, start the initial reconnaissance using the following Nmap command:nmap -A -Pn <ip> -vAs you can see, ports 22, 80, and 3306 are open.

  • Nov 15, 2024 | medium.com | Aman Chauhan

    Aman Chauhan·Follow5 min read·--Attactive DirectoryImagine a small startup with just three or four computers. An administrator can easily walk up to each machine to create or delete user accounts, configure settings, and update software. However, in a large organization with thousands of computers, this manual approach becomes impractical. This is where Active Directory (AD) comes into play.

  • Nov 9, 2024 | medium.com | Aman Chauhan

    Aman Chauhan·Follow5 min read·--NFS (Network File System) is a protocol widely used to share directories across networks, similar to SMB and FTP, enabling users to upload, download, and access files. However, certain configurations, such as enabling the no_root_squash option, can introduce privilege escalation vulnerabilities. This guide demonstrates how to configure a misconfigured NFS server and exploit these vulnerabilities to achieve root access on a target machine.

  • Oct 26, 2024 | medium.com | Aman Chauhan

    Aman Chauhan·Follow2 min read·--Banner grabbing is a technique used to get information about a web server. This can include details about the software and version it’s running. In this guide, we’ll use three tools — nc (Netcat), telnet, and curl—to grab banners from Google.com. A terminal or command promptAccess to nc, telnet, and curl (these are usually available on most computers)Open your terminal.

Contact details

Socials & Sites

Try JournoFinder For Free

Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.

Start Your 7-Day Free Trial →