Search
Exploit Development
Mastering exploit development allows hackers to create custom tools to bypass modern defenses, especially when standard exploits are ineffective.

3 min read
NEW No-Click Critical Vulnerability in Microsoft Windows: CVE-2025-21298
Welcome back, my aspiring cyberwarriors! Over the years, Microsoft Windows operating system, the world's most widely used OS, has been...
1,755 views

5 min read
Exploit Development: Fuzzing with American Fuzzy Lop++ (AFL++) to Find Zero-Day Vulnerabilities
Welcome back, my aspiring cyberwarriors! Finding vulnerabilities in applications and services is the first step toward developing your...
1,214 views

5 min read
Exploit Development: Building Your Own Fuzzer with BASH
Welcome back, my aspiring cyberwarriors! In the digital battleground of cybersecurity, web application fuzzing stands as a critical...
972 views

4 min read
Using the Brand New ( CVE-2024-38063) IPv6 Exploit to DoS a Windows System
Welcome back, my aspiring cyberwarriors! Recently, security researchers discovered a critical vulnerability in the Windows IPv6 packet...
1,438 views

3 min read
Privilege Escalation: The Dirty Pipe Exploit to Escalate Privileges on Linux Systems
Welcome back, my aspiring cyberwarriors! Often, after successfully compromising a system, we are limited to the privilege's of the...
5,586 views


4 min read
Building a Honeypot to Capture Zero-Day Exploits, Part 1
The Holy Grail of any hacker is to develop a zero-day exploit—an exploit that has never been seen by antivirus (AV) or intrusion...
4,611 views


5 min read
Working with Exploits: Using Exploit-DB to find Exploits
I. Introduction This section of this course is designed to help you find and use exploits that will work against known vulnerabilities....
6,849 views


5 min read
SCADA Hacking: Developing Zero-Day SCADA Exploits
As white-hat hackers, ultimately we want to be able to develop exploits for SCADA/ICS systems. In this way, we can find vulnerabilities...
6,618 views


5 min read
Metasploit Basics, Part 13: Exploiting Android Mobile Devices (Updated)
Welcome back, my budding hackers! The growth of the mobile device market has been dramatic over the past 10 years. From its birth in 2007...
70,441 views

4 min read
Network Forensics, Part 2: Packet-Level Analysis of the NSA's EternalBlue Exploit
Welcome back, my aspiring cyber warriors! In April 2017, a nefarious group known only as the Shadow Brokers, released to the world a...
19,609 views


1 min read
Hack like the NSA: The New Shadow Brokers Exploits
Recently, Shadow Brokers--that mysterious group that has been trying to sell stolen NSA zero-day exploits over most of the last...
7,984 views


3 min read
Bluetooth Hacking, Part 3: The BlueBourne Exploit
When BlueTooth was first introduced in 1994 by Ericcson Corporation of Sweden, it was very insecure. Hackers could steal information and...
53,241 views


4 min read
Snort Basics for Hackers, Part 5: Testing your Snort IDS Against Known Exploits
Welcome back, my greenhorn cyber warriors! In my previous posts in this series, we installed Snort, configured Snort, set up Snort to...
13,971 views

4 min read
Metasploit Basics, Part 22: Exploiting and Controlling a System When You Have Physical Access
Welcome back, my aspiring cyber warriors! Much of what we have done here in this Metasploit Basics series enables us to exploit and...
3,700 views


6 min read
Exploit Development, Part 1: Anatomy of Buffer Overflows
Introduction Buffer Overflows Buffer overflows are probably the most insidious type of attack. A buffer overflow is basically when a...
7,910 views


3 min read
How to Exploit Nearly Any Windows System Using CVE-2017-8759
On September 12, 2017, FireEye revealed that they had found malware in the wild that exploited CVE-2017-8759. This malware exploits a...
10,543 views


7 min read
Metasploit Basics, Part 15: Post- Exploitation Fun (Web Cam, Microphone, Passwords and more)
Welcome back, my fledgling hackers! As we have progressed through this series on Metasploit Basics, we have used numerous techniques to...
39,787 views


5 min read
SCADA Hacking: Exploiting SCADA/ICS Systems with the Command Line Tool, modbus-cli
For those of you who have been following my series on SCADA hacking, you are aware that SCADA/ICS systems do NOT use the usual protocols...
14,672 views


5 min read
Hack Like the NSA:The EXTRABACON Zero-Day Exploit on Cisco ASA Firewalls
As most of you know, recently an entity within the NSA--or very close to the NSA--was hacked. This NSA associated group, often referred...
9,042 views

5 min read
Exploiting SNMPv1 for Reconnaissance
As you know, the Simple Network Management Protocol uses UDP ports 161 and 162 to manage network devices. Network devices use this...
14,188 views