Skip to content

counter-yandex

counter-google

Ivan Glinkin

Information Security Manager
  • Main
  • Resume/CV
  • For hackers
    • Walkthrough
    • CheatLists
  • Social
    • LinkedIn
    • Twitter
    • Telegram
    • PayPal
  • Mail me

Walkthrough

Logo
  • CheatLists
BurpSuitecertificateiosipadiphoneKalikochavalinuxmachinemackbookmcdonaldsmicrosoftowaspParallelsprivacyproxyskypeteamsvirtualVirtualBoxvmware

Brief iOS apps analysis (without Jailbreak)

Ivan Glinkin 26.11.2022

For cyber security analysts and penetration testers dealing with mobile applications is the day-to-day activity. But if we are talking about Android applications, it’s quiteView More

shellDAVpass
  • CheatLists
antivirusapacheavbatchbypasscatCCchownCommand controlcontroldatedefenderechoevadehacktheboxipmaliciouspenetration testpentestpentester academyphppowershellreadSDLCshellShikata ga naiwindowszeropointsecurity

shellDAVpass – non interactive reverse shell to bypass the defender and AntiVirus detections

Ivan Glinkin 21.06.2022

When we are talking about hacking, basically, the main purpose of any penetration testing is to get the full control over the server aka theView More

Free OpenVPN safe logo
  • Walkthrough
44580apt-getcvedefaultethicalfreegnuhackeripKalilinuxmasknetworknmapopensslopenvpnovpnpasswordprivatesmbmapsoftwaresubnetunzipvirtualvpnwget

Are free VPNs safe enough?

Ivan Glinkin 13.05.2022

Nowadays, more and more people are using VPN (virtual private network) for different purposes. For one of them that’s a good stuff to hide theirView More

alfa_AWUS036ACH
  • CheatLists
alfaAWUS036ACHinstallKalilinuxwifi

Alfa AWUS036ACH WiFi adapter install on Kali Linux

Ivan Glinkin 02.04.2022

That is the single instruction how to install Alfa AWUS036ACH WiFi adapter on Kali Linux (including M1 Mac CPU). INSTALLATION git clone https://github.com/aircrack-ng/rtl8812au.git # DownloadView More

volatility foundation
  • CheatLists
cpudistormgitinstallinstructionKalilinuxm1macprofilepycryptopythonvolatility

Install Volatility on Kali Linux (including M1 Mac CPU)

Ivan Glinkin 23.03.2022

That is the single instruction how to install Volatility application on Kali Linux (including M1 Mac CPU). INSTALLATION #!/bin/bashsudo apt-get updatesudo apt install -y python2.7sudoView More

Childhood_diseases_logo
  • Walkthrough
AdobeassessmentAuthorization bypassbashBugCrowdBurpSuitecompanyCWEDepartment of DefensedevopsFordgithubhackeronehardcodedhistoryIDORLFImail.rupasswdpasswordpathPIIpythonshadowShopifystatisticssudoersSynacktraversaltwittervulnerabilityYahoo

Big companies “Childhood diseases”

Ivan Glinkin 08.01.2022

There is a widespread opinion as big the company is as harder to find breaches there: all the well-known vulnerabilities are fixed and mitigated, DevOpsView More

AutoSUID_PoC
  • CheatLists
bashcatescalatingprivilegesrootsuiduserzsh

AutoSUID

Ivan Glinkin 01.12.2021

AutoSUID application is the Open-Source project, the main idea of which is to automate harvesting the SUID executable files and to find a way forView More

The_Russian_Kerbrute_logo
  • CheatLists
Active DirectoryADattackcatdictionaryemailharvestkerberos_enumuserskerbruteloginmetasploitmicrosoftMITparsingrussiansurnametailtrtransliterationuserusernamewc

The Russian Kerbrute

Ivan Glinkin 02.11.2021

The first thing every penetration tester performs getting into a controller domain subnet is to brute force discovery of users which is called a KerbruteView More

hakin9-FGDS
  • CheatLists
adminbanbashdomaindorkdorksfiletypegithubgoogleintitleinurlpathrobotscan

Fast Google Dorks Scan

Ivan Glinkin 15.10.2021

“Enumeration is the key” – that’s the main tagline of the Offensive Security Certified Professional certification. Indeed, as a statistic says, more than a halfView More

h@cktivitycon2021 by HackerOne
  • CheatLists
&&||$!adminandroidapiaudio analyzerbase32base64bashBuffer overflowcmdcongon4torCTFCyber ChefdatabaseexportflaggimphackerhackeronehacktheboxIOT villageJohn HammondoffensivesecurityosintpythonrbashRed Team Villagesourcec-codeSQL LiteSSRFteamuharcwfuzzwindows

h@cktivitycon2021 by HackerOne

Ivan Glinkin 22.09.2021

Capture the flag (aka CTF) is a cybersecurity game the main aim of which is to crack/solve/find the solution to the weirdest IT tasks andView More

Kept bombing out in heat
  • Walkthrough
adminappriciationbountybugbugbountyCambridgedorksemailfgdsgooglehackeronehashleakletterMITMySQLpasswordphpbbphpMyAdminpocproof of conceptrcesource codesqlUniversitywappalyzer

“Kept bombing out in HEAT” or how I hacked Cambridge and MIT subdomains within a week and didn’t even get any thanks

Ivan Glinkin 27.06.2021

Once you got into cybersecurity, you want to hack everything. You may be surprised but in some way it’s possible and even rewarded by theView More

0day_TryHackMe_002
  • Walkthrough
0daybridgedefaultexploitfirewallforwardinghackinghtbHTTPipiptablesKalilinuxmsfconsolenmapopenvpnovpnowaparrotpasswordpingportproxychainssmbSSHsudosweeptoortryhackmevpn

If you play with hackers, don’t be surprised when you get hacked or TryHackMe 0-day exploit

Ivan Glinkin 25.05.2021

There is always something new happens in our life: new work, new experience, new field of study, etc. And cyber security is not an exception:View More

Red Teaming - Through PostgreSQL to shell
  • CheatLists
ncnetcatpostgreSQLreverseshellsql

Red Teaming – Through PostgreSQL to shell

Ivan Glinkin 08.04.2021

The easiest way to get reverse shell through the PostgreSQL database. 1. Connect to the DB2. Create a new table     CREATE TABLE demo(t text);3. RunView More

Cheat_031
  • CheatLists
AWSbashBash scriptingcheatconnectionDebianEC2examgrephacktheboxhosthtbInstanceinternetKalilablaboratorylinuxncNICOffSecopenvpnoscpovpnparrotssSSHsystemctltunneludpVLANVMwhile

How to cheat on a Cyber Security exam

Ivan Glinkin 29.03.2021

Cheating is unfair, wrong and, in particular cases, strictly prohibited by the law. It may cause you lose your friends, family, achievements, work and whatever.View More

data leaks without hacking logo
  • Walkthrough
awkbashBash scriptingCMSconceptcrackcurldatagmail.comgrephackingissueleakletmisconfigurationpaginationparsingpentestpersonalproofscriptsearchsedsensitivesource codetrvictimvpswebwhois

Data leaks without hacking

Ivan Glinkin 07.02.2021

Sometimes, to get personal or other private information there is no need to crack the system. Web-site owners and/or system administrators have not set policiesView More

Posts navigation

Page 1 Page 2 Next page