// essentialexploit.com

RabbidByte

Hacker, Bug Hunter, and all round Geek/Nerd. Documenting exploits, CTF write-ups, and security research.

All Posts
Blog

The New Phish

Scams and phishing are continually getting more creative, and today I came across one phishing attack that really kinda amazed me. The attack uses a legitimate Microsoft login pag…

Read more →
Blog

Offensive Security AWAE

A few months ago registration for BlackHat USA19 kicked off, and for the third year in a row I just missed getting into Offensive Security’s Advanced Web Attacks and Exploitation (…

Read more →
BlogCtF

Hacker0x01 50m_ctf

So I have never done write-ups for CtF's before but I am taking the information that I have and putting it all together in some posts. This post and CtF posts before this date are…

Read more →
BlogCtF

KringleCon 2018

SANS puts on KringleCon and I have to say not only was it fun but some of it really made me think. I made it to the end of this one but yet once again … I am writing this way, way…

Read more →
BlogCtF

Metasploit/Rapid7 CtF: 2018

This was the first CtF that I participated in that I actually kept files for. This was don back in late 2018 and here I am almost 4 months later trying to write about it ... yeah …

Read more →
BlogCtF

Hacker 101: CtF Series

Hacker0x01 has a great CtF series that is just perfect for practicing. Although it would not be fair to release findings as there are h1 private invites being awarded for the comp…

Read more →
BlogMisc

AWS S3: Misconfiguration, Discovery, and Abuse

Recent news of the Verizon data leak http://www.darkreading.com/cloud/verizon-suffers-cloud-data-leak-exposing-data-on-millions-of-customers/ and a similar scenario concerning Dow …

Read more →
BlogMisc

HackRF: The easy way

RTL-SDR is a dirt cheap way to start playing with radio using the RTL2832U chipset. I like to do things right when I start a project so I decided to purchase a nice SDR hardware tr…

Read more →
BlogMisc

Transfer Any Binary into a Protected Network

Well this is another old trick that still works today. It still gets past all edge security and antivirus … well that is until you pull the executable out again. I find myself us…

Read more →
Blog

Offensive Security PWB (OSCP) - A Review

Let’s start off on the right foot shall we? I don’t want to be rude but – I am a computer geek, my writing skills are not so great. So if you don’t like the way I write just quit…

Read more →
BlogTools

TransHex Server and Client

We have all faced the problem of transferring “malicious” or binary files through corporate firewalls or proxies when doing penetration tests. Previously the work around was quite…

Read more →
BlogTools

GFI LanGuard 2012 Priviledge Escalation

https://github.com/RabbidByte/GFI2012-PrivilegeEscalation

Read more →
BlogMisc

Mobile Hacking

1. an Alix board, CF, and enclosure 2. two ALPHA USB Wireless cards 3. a cell phone that you can tether to 4. mobile power solution

Read more →