--------------------------------------------------------------------------------------------------- $$\ $$\ $$$$$$\ $$\ $$\ $$ | $$ | $$$ __$$\ $$$$ | $$ | $$$$$$\ $$$$$$\ $$$$$$\ $$$$$$$\ $$$$$$$ | $$$$$$\ $$$$\ $$ |\_$$ | $$$$$$$ | $$ __$$\\_$$ _| \____$$\ $$ __$$\ $$ __$$ |$$ __$$\ $$\$$\$$ | $$ | $$ __$$ | $$ | \__| $$ | $$$$$$$ |$$ | $$ |$$ / $$ |$$ | \__|$$ \$$$$ | $$ | $$ / $$ | $$ | $$ |$$\ $$ __$$ |$$ | $$ |$$ | $$ |$$ | $$ |\$$$ | $$ | $$ | $$ | $$ | \$$$$ |\$$$$$$$ |$$ | $$ |\$$$$$$$ |$$ | \$$$$$$ /$$$$$$\\$$$$$$$ | \__| \____/ \_______|\__| \__| \_______|\__| \______/ \______|\_______| --------------------------------------------------------------------------------------------------- == Blogs ==================================================================== | | | LLMNR and WPAD poisoning | | Powershell Reverse Shell | | Setting Up a PetitPotam Attack Lab | | Taking Over a Subdomain via AWS s3 Buckets | | | | | ==============================================================================