Found 699 skills for "mukul975" Page 19 of 59

hunting-for-dns-based-persistence

Attackers establish DNS-based persistence by hijacking DNS records, creating unauthorized subdomains, abusing wildcard DNS entries, or modifying NS de...

github 4 files

implementing-application-whitelisting-with-applocker

Use this skill when: Implementing application control to prevent unauthorized software execution on Windows endpoints Meeting compliance requirements ...

github 8 files

implementing-aws-iam-permission-boundaries

IAM permission boundaries are an advanced AWS feature that sets the maximum permissions an identity-based policy can grant to an IAM entity (user or r...

github 8 files

exploiting-insecure-deserialization

During authorized penetration tests when applications process serialized data (cookies, API parameters, message queues) When identifying Java serializ...

github 4 files

exploiting-ipv6-vulnerabilities

Testing whether dual-stack networks have consistent security controls for both IPv4 and IPv6 traffic Demonstrating risks from unmanaged IPv6 on networ...

github 4 files

exploiting-ms17-010-eternalblue-vulnerability

MS17-010 (EternalBlue) is a critical vulnerability in Microsoft's SMBv1 implementation that allows remote code execution. Originally discovered by the...

github 8 files

exploiting-nopac-cve-2021-42278-42287

Legal Notice: This skill is for authorized security testing and educational purposes only. Unauthorized use against systems you do not own or have wri...

github 8 files

exploiting-oauth-misconfiguration

During authorized penetration tests when the application uses OAuth 2.0 or OpenID Connect for authentication When assessing "Sign in with Google/Faceb...

github 4 files

exploiting-smb-vulnerabilities-with-metasploit

Testing Windows systems for critical SMB vulnerabilities (EternalBlue, EternalRomance, PrintNightmare) during authorized penetration tests Demonstrati...

github 4 files

exploiting-sql-injection-vulnerabilities

Testing web application input parameters for SQL injection vulnerabilities during an authorized penetration test Validating that parameterized queries...

github 4 files

exploiting-template-injection-vulnerabilities

During authorized penetration tests when user input is rendered through a server-side template engine When testing error pages, email templates, PDF g...

github 4 files

detecting-pass-the-hash-attacks

When proactively hunting for indicators of detecting pass the hash attacks in the environment After threat intelligence indicates active campaigns usi...

github 8 files