In this post, I'll walk through how I was able to gain unauthorized access to multiple machines by exploiting unencrypted private keys and misconfigured SSH settings.
In this blog, we will explore how I performed lateral movement and gained access to multiple machines on a private network by logging SSH credentials.
In this blog, I’ll walk through how I created a heat map for the Linux computer labs at IIT Kanpur. This approach can be applied to any institute or organization with a similar setup.
This blog explores how I successfully escalated privileges to root on a remote server through social engineering, highlighting the techniques used and offering mitigation strategies to prevent such attacks.
In this blog, we explore how to gain remote root access on devices via Portainer, covering OSINT techniques, brute-force attacks, and exploiting misconfigurations, while offering mitigation strategies to enhance security.