From Asset Discovery to Directory/File Brute-Forcing to Password Cracking

Handy Mandy


Manipulating File Descriptors to Obtain Remote Code Execution

The Reverse Shell

Establishing a Connection


Make SQL Injection Vulnerabilities Harder to Exploit


Get an Alert when Someone Accesses a File

What are Canaries?


How Hackers Clone Sites and Create Malicious Login Pages

Cloning our Target Login Page


A Proof of Concept Python Virus


And an Example Showing Memory Injection

Windows API Functions for Process Manipulation


Windows Registry = Digital Forensics Gold Mine

What is the Windows Registry?


The Malware Used in the Trojanized SolarWinds Orion Update

The SolarWind’s Supply Chain Attack


Exploiting an 802.11 Flaw

How does a Deauthentication Attack Work?

Alexis Rodriguez

OSCP CySA+ Security+ | Part-time Cybersecurity Instructional Associate @ Fullstack Academy

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store