• Home
  • Web Application
  • Walkthough
  • Interview Questions
  • Active Directory
  • About us
  • Latest CVE
Shiv Shankar Founder of UntoldcyberShiv Shankar Founder of Untoldcyber
  • Home
  • Web Application
  • Walkthough
  • Interview Questions
  • Active Directory
  • About us
  • Latest CVE

Blog

Blogs

Apache 2.4.49/2.4.50: CVE-2021–41773

CVE-2021-41773 A weakness was discovered in a change to path normalisation in Apache HTTP Server 2.4.49. An attacker could employ a path traversal attack to redirect URLs to files outside of the folders specified by Alias-like directives. If files outside...

Read more
Blogs

NoName : Walkthrough PG Ground Play

Welcome to our walkthrough guide for a medium-difficulty challenge that explores a Linux operating system. In this tutorial, we will delve into a command injection vulnerability, uncovering the intricate steps to exploit it successfully. Additionally, we’ll master the art of...

Read more
Blogs

Untold Cyber Crime : Top Cyber Crime

Top Cyber Crime in 2022 What is Cyber Crime ? Cyber Crime is defined as “the illegal use of any communication device to commit or assist in the commission of any illegal act.” According to Wikipedia , “A crime involving...

Read more
Active Directory

Active Directory : Kerberoasting

Kerberoasting exploits weak Kerberos SPNs in Active Directory, letting attackers extract encrypted service account passwords and crack them offline for privilege escalation. What is Kerberoasting? Kerberoasting is an abuse of Kerberos authentication in Active Directory. Any authenticated user in the Read more

By Shiv Shankar, 12 months ago
Active Directory

Active Directory: Basic Enumeration

Active Directory is a directory service to store and organize objects on a network (such as computers, users, and devices) provided by Windows. According to Wikipedia, “Microsoft previewed Active Directory in 1999, released it first with Windows 2000 Server edition, and revised Read more

By Shiv Shankar, 12 months ago
Study Material

Authentication Bypass via Information Disclosure

In terms of cybersecurity, authentication bypass by information leak is a major vulnerability that can threaten the integrity of sensitive systems. This attack vector arises when an application mistakenly reveals sensitive information—such as configuration files, database credentials, or user data—due Read more

By Shiv Shankar, 1 year ago
Active Directory

Active Directory: Post Exploitation

What is LLMNR Poisoning Attack? Link-Local Multicast Name Resolution (LLMNR) is a protocol used by Windows operating systems to resolve names on a local network when DNS resolution fails. LLMNR allows computers to perform name resolution for hosts on the Read more

By Shiv Shankar, 1 year ago
Walkthrough

CVE-2024-34470: Path Traversal: HSC Mailnspector

CVE-2024-34470 Summary :  A vulnerability, classified as critical, was found in HSC Mailinspector up to 5.2.18. This affects an unknown part of the file /public/loader.php. The manipulation of the argument path leads to path traversal. This vulnerability is uniquely identified as CVE-2024-34470. There is no exploit Read more

By Shiv Shankar, 1 year ago
Web Application

Command Injection : Source Code Review

What is the command injection? Command injection is the web application vulnerability that allows an attacker to execute the arbitrary system command on the server where the application is running. This vulnerability leads to fully compromised server by remote code Read more

By Shiv Shankar, 1 year ago

Posts pagination

1 2 … 5 Next
  • Active Directory : Kerberoasting
  • Active Directory: Basic Enumeration
  • Authentication Bypass via Information Disclosure
  • Apache 2.4.49/2.4.50: CVE-2021–41773
  • Active Directory: Post Exploitation
  • Active Directory
  • Blogs
  • Career
  • Hacks
  • Study Material
  • Uncategorized
  • Walkthrough
  • Web Application
Join our Community
  • About us
  • Privacy Policy
  • Terms and condition
  • Contact us
Hestia | Developed by ThemeIsle