{"version":1,"pages":[{"id":"-MPQCoj7u5KQOnw-UBEc","title":"Introduction","pathname":"/","siteSpaceId":"sitesp_Th7i2","description":"This page serves as an introduction to what this Wiki is about and what content it will (or potentially will) consist of."},{"id":"-MQZLx2FjnRS4Ve1aZl-","title":"Application Security","pathname":"/pentesting/application-security","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"}]},{"id":"-MRQNIrj6-5Cv1cWVnAV","title":"Mobile App Security","pathname":"/pentesting/application-security/mobile-security","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Application Security"}]},{"id":"-Mfw9_pZBUVOSuysS2Wb","title":"Android Application Testing","pathname":"/pentesting/application-security/mobile-security/android-application-testing","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Application Security"},{"label":"Mobile App Security"}]},{"id":"QejPBBlHqUUlxOfJFiGY","title":"Security Checklist","pathname":"/pentesting/application-security/mobile-security/android-application-testing/security-checklist","siteSpaceId":"sitesp_Th7i2","description":"A checklist with security considerations for designing, testing, and releasing secure Android apps. It is based on the OWASP Mobile Application Security Verification Standard, Mobile Application Secur","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Application Security"},{"label":"Mobile App Security"},{"label":"Android Application Testing"}]},{"id":"isykCeRdO3nQuO46z4oM","title":"SSL Pinning Bypasses","pathname":"/pentesting/application-security/mobile-security/android-application-testing/ssl-pinning-bypasses","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Application Security"},{"label":"Mobile App Security"},{"label":"Android Application Testing"}]},{"id":"FdQVnpjOQb6X5PpQZKhZ","title":"Non-Proxy Aware Applications","pathname":"/pentesting/application-security/mobile-security/android-application-testing/non-proxy-aware-applications","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Application Security"},{"label":"Mobile App Security"},{"label":"Android Application Testing"}]},{"id":"9c4XacBfaX4CE2Y210Gs","title":"Setting up VPN Server","pathname":"/pentesting/application-security/mobile-security/android-application-testing/non-proxy-aware-applications/setting-up-vpn-server","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Application Security"},{"label":"Mobile App Security"},{"label":"Android Application Testing"},{"label":"Non-Proxy Aware Applications"}]},{"id":"e3iSoyWb7F3XONivbHjn","title":"Bypasses","pathname":"/pentesting/application-security/mobile-security/android-application-testing/non-proxy-aware-applications/bypasses","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Application Security"},{"label":"Mobile App Security"},{"label":"Android Application Testing"},{"label":"Non-Proxy Aware Applications"}]},{"id":"TGoce3P39mzwEmevpSbc","title":"Common Proxying Issues","pathname":"/pentesting/application-security/mobile-security/android-application-testing/common-proxying-issues","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Application Security"},{"label":"Mobile App Security"},{"label":"Android Application Testing"}]},{"id":"b42JQpu6vbZopFWaS38R","title":"Android Local Storage Checks","pathname":"/pentesting/application-security/mobile-security/android-application-testing/android-local-storage-checks","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Application Security"},{"label":"Mobile App Security"},{"label":"Android Application Testing"}]},{"id":"k7sVFo13cdBwMHA1ezeH","title":"Android Task Hijacking","pathname":"/pentesting/application-security/mobile-security/android-application-testing/android-task-hijacking","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Application Security"},{"label":"Mobile App Security"},{"label":"Android Application Testing"}]},{"id":"kk9sWu0P920R7CRftO3E","title":"Kiosk Mode / Breakout Testing","pathname":"/pentesting/application-security/mobile-security/android-application-testing/kiosk-mode-breakout-testing","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Application Security"},{"label":"Mobile App Security"},{"label":"Android Application Testing"}]},{"id":"iN6CR5DmaObUbhH2aB2w","title":"Magisk on GenyMotion","pathname":"/pentesting/application-security/mobile-security/android-application-testing/magisk-on-genymotion","siteSpaceId":"sitesp_Th7i2","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Application Security"},{"label":"Mobile App Security"},{"label":"Android Application Testing"}]},{"id":"-MRQjUVvJh_8bekvwgg_","title":"iOS Application Testing","pathname":"/pentesting/application-security/mobile-security/ios","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Application Security"},{"label":"Mobile App Security"}]},{"id":"fqeTZWWxABTbRGdTvQIx","title":"iOS Testing Using Objection","pathname":"/pentesting/application-security/mobile-security/ios/ios-testing-using-objection","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Application Security"},{"label":"Mobile App Security"},{"label":"iOS Application Testing"}]},{"id":"YI1PLNDZknx7jikvPEp3","title":"IPA Analysis Using MobSF","pathname":"/pentesting/application-security/mobile-security/ios/ipa-analysis-using-mobsf","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Application Security"},{"label":"Mobile App Security"},{"label":"iOS Application Testing"}]},{"id":"-MRQfY5vvXtcHzY5DIZB","title":"iOS Jailbreak Bypass","pathname":"/pentesting/application-security/mobile-security/ios/ios-jailbreak-bypass","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Application Security"},{"label":"Mobile App Security"},{"label":"iOS Application Testing"}]},{"id":"NZugxS657wCJBXTBWmaT","title":"Decrypting iOS Apps","pathname":"/pentesting/application-security/mobile-security/ios/decrypting-ios-apps","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Application Security"},{"label":"Mobile App Security"},{"label":"iOS Application Testing"}]},{"id":"z95r2EyI41UKKz0PIv3V","title":"iOS Reverse Engineering","pathname":"/pentesting/application-security/mobile-security/ios/ios-reverse-engineering","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Application Security"},{"label":"Mobile App Security"},{"label":"iOS Application Testing"}]},{"id":"jEekU0TlymFUimNAQfWs","title":"Jailbreak Detection Bypasses","pathname":"/pentesting/application-security/mobile-security/ios/jailbreak-detection-bypasses","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Application Security"},{"label":"Mobile App Security"},{"label":"iOS Application Testing"}]},{"id":"BONtFcfc8DcIhFYvJYE3","title":"iOS Local Storage Checks","pathname":"/pentesting/application-security/mobile-security/ios/ios-local-storage-checks","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Application Security"},{"label":"Mobile App Security"},{"label":"iOS Application Testing"}]},{"id":"GWFmG8v2hcvIkRtZrGyo","title":"Installing IPA","pathname":"/pentesting/application-security/mobile-security/ios/installing-ipa","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Application Security"},{"label":"Mobile App Security"},{"label":"iOS Application Testing"}]},{"id":"evBdHJShqKDJ4jZzkVzz","title":"ATS Auditing","pathname":"/pentesting/application-security/mobile-security/ios/ats-auditing","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Application Security"},{"label":"Mobile App Security"},{"label":"iOS Application Testing"}]},{"id":"axb9DjchopdsSOdyyD1x","title":"iOS Jailbreaking","pathname":"/pentesting/application-security/mobile-security/ios/ios-jailbreaking","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Application Security"},{"label":"Mobile App Security"},{"label":"iOS Application Testing"}]},{"id":"311c8bd84vhY3JQ72i4q","title":"Frida Pinning Bypasses","pathname":"/pentesting/application-security/mobile-security/ios/frida-pinning-bypasses","siteSpaceId":"sitesp_Th7i2","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Application Security"},{"label":"Mobile App Security"},{"label":"iOS Application Testing"}]},{"id":"DFIKvE9CxbFjy4K8pxVA","title":"iOS Jailbreaking","pathname":"/pentesting/application-security/mobile-security/ios/ios-jailbreaking-1","siteSpaceId":"sitesp_Th7i2","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Application Security"},{"label":"Mobile App Security"},{"label":"iOS Application Testing"}]},{"id":"TdZucz9Gu9RGedhMgGoV","title":"Performing a Jailbreak with Palera1n","pathname":"/pentesting/application-security/mobile-security/ios/ios-jailbreaking-1/performing-a-jailbreak-with-palera1n","siteSpaceId":"sitesp_Th7i2","description":"Palera1n is a semi-tethered jailbreak for iOS. This guide walks you through the full process of jailbreaking your iOS device using Palera1n.","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Application Security"},{"label":"Mobile App Security"},{"label":"iOS Application Testing"},{"label":"iOS Jailbreaking"}]},{"id":"lD1sfIJm0gHaALITydok","title":"Palera1n Cheatsheet","pathname":"/pentesting/application-security/mobile-security/ios/ios-jailbreaking-1/palera1n-cheatsheet","siteSpaceId":"sitesp_Th7i2","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Application Security"},{"label":"Mobile App Security"},{"label":"iOS Application Testing"},{"label":"iOS Jailbreaking"}]},{"id":"13nOhFDYs4DbNwx6rzEb","title":"Code Security","pathname":"/pentesting/application-security/mobile-security/code-security","siteSpaceId":"sitesp_Th7i2","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Application Security"},{"label":"Mobile App Security"}]},{"id":"rnkzBpk1lVIxEreX6NNZ","title":"Frida on Windows","pathname":"/pentesting/application-security/mobile-security/frida-on-windows","siteSpaceId":"sitesp_Th7i2","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Application Security"},{"label":"Mobile App Security"}]},{"id":"-MQZMBDTgL7kyjimY1Pe","title":"Web Application Security","pathname":"/pentesting/application-security/web-application-security","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Application Security"}]},{"id":"-MXc4h8h1I0wDIE2f33C","title":"Web Shells","pathname":"/pentesting/application-security/web-application-security/web-shells","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Application Security"},{"label":"Web Application Security"}]},{"id":"-MQZLeRRZ607L-9WE18p","title":"CSV Injection","pathname":"/pentesting/application-security/web-application-security/csv-injection","siteSpaceId":"sitesp_Th7i2","description":"A collection of CSV Injection templates and payloads","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Application Security"},{"label":"Web Application Security"}]},{"id":"P4s14EuXqd66a7geLLCm","title":"Measure Response Time using CURL","pathname":"/pentesting/application-security/web-application-security/measure-response-time-using-curl","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Application Security"},{"label":"Web Application Security"}]},{"id":"xV9CNqVhTXQtlmHY5X1z","title":"OSINT","pathname":"/pentesting/application-security/web-application-security/osint","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Application Security"},{"label":"Web Application Security"}]},{"id":"3Oyas2v0qbIMmNpd54kW","title":"EyeWitness","pathname":"/pentesting/application-security/web-application-security/osint/eyewitness","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Application Security"},{"label":"Web Application Security"},{"label":"OSINT"}]},{"id":"sS2m3D8Jmv0MjMtb6xoZ","title":"GraphQL Hacking","pathname":"/pentesting/application-security/web-application-security/graphql-hacking","siteSpaceId":"sitesp_Th7i2","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Application Security"},{"label":"Web Application Security"}]},{"id":"-MPzgqL19wNt4DD9Xaws","title":"API Security","pathname":"/pentesting/application-security/api-security","siteSpaceId":"sitesp_Th7i2","description":"This section consits of best practices, security checklists, common vulnerability writeups and other API security related content.","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Application Security"}]},{"id":"-MPzguWPWIrP_Lr9jCma","title":"Security Checklist","pathname":"/pentesting/application-security/api-security/untitled","siteSpaceId":"sitesp_Th7i2","description":"This security checklist consists of security countermeasures when designing, testing, and releasing your API.","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Application Security"},{"label":"API Security"}]},{"id":"iM3psXLHRC0hW0Ji7wex","title":"Postman and Burp","pathname":"/pentesting/application-security/api-security/postman-and-burp","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Application Security"},{"label":"API Security"}]},{"id":"C4Si7ai3bPIWnpsiizpe","title":"CURL via BurpSuite","pathname":"/pentesting/application-security/api-security/curl-via-burpsuite","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Application Security"},{"label":"API Security"}]},{"id":"Sbn14wmc2zhluEFrX4oU","title":"SOAP API Pentesting","pathname":"/pentesting/application-security/api-security/soap-api-pentesting","siteSpaceId":"sitesp_Th7i2","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Application Security"},{"label":"API Security"}]},{"id":"-MQZMPhbwyMHIL5nlbxk","title":"Infrastructure Security","pathname":"/pentesting/infrastructure-security","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"}]},{"id":"-MRQgt900LuKATggDfDq","title":"Network Infrastructure","pathname":"/pentesting/infrastructure-security/network-infrastructure","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Infrastructure Security"}]},{"id":"1SGXv2IfghUsOqHKnrmn","title":"Red Team Powershell Scripts","pathname":"/pentesting/infrastructure-security/network-infrastructure/red-team-powershell-scripts","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Infrastructure Security"},{"label":"Network Infrastructure"}]},{"id":"-MflqqXSQdXMV_cbIRjK","title":"Mounting NFS Shares","pathname":"/pentesting/infrastructure-security/network-infrastructure/mounting-nfs-shares","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Infrastructure Security"},{"label":"Network Infrastructure"}]},{"id":"k1DZYtqHD4RkeyWRcCSm","title":"Password Cracking/Auditing","pathname":"/pentesting/infrastructure-security/network-infrastructure/password-cracking-auditing","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Infrastructure Security"},{"label":"Network Infrastructure"}]},{"id":"-MdHGJK2Qm0Ypx9-CpXz","title":"Remote Access Sheet","pathname":"/pentesting/infrastructure-security/network-infrastructure/remote-access-sheet","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Infrastructure Security"},{"label":"Network Infrastructure"}]},{"id":"UPjz2mx8UkUwIBE96SX8","title":"Password Cracking Using Hashcat","pathname":"/pentesting/infrastructure-security/network-infrastructure/password-cracking-using-hashcat","siteSpaceId":"sitesp_Th7i2","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Infrastructure Security"},{"label":"Network Infrastructure"}]},{"id":"2gU0r6horaTo86A7FUks","title":"Calculate IP Addresses from CIDR","pathname":"/pentesting/infrastructure-security/network-infrastructure/calculate-ip-addresses-from-cidr","siteSpaceId":"sitesp_Th7i2","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Infrastructure Security"},{"label":"Network Infrastructure"}]},{"id":"wereZu1QXEMwa3Ttm3Qk","title":"Grep IP addresses or IP Ranges from a File","pathname":"/pentesting/infrastructure-security/network-infrastructure/grep-ip-addresses-or-ip-ranges-from-a-file","siteSpaceId":"sitesp_Th7i2","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Infrastructure Security"},{"label":"Network Infrastructure"}]},{"id":"RfnVfv0in3JyE7nlyMiq","title":"Default Credentials Checking","pathname":"/pentesting/infrastructure-security/network-infrastructure/default-credentials-checking","siteSpaceId":"sitesp_Th7i2","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Infrastructure Security"},{"label":"Network Infrastructure"}]},{"id":"4SUFIK4sjZUJJY7z7WP4","title":"Check SSL/TLS Certificates","pathname":"/pentesting/infrastructure-security/network-infrastructure/check-ssl-tls-certificates","siteSpaceId":"sitesp_Th7i2","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Infrastructure Security"},{"label":"Network Infrastructure"}]},{"id":"7c4MpgDZbPIOhXapiezm","title":"Log a terminal session","pathname":"/pentesting/infrastructure-security/network-infrastructure/log-a-terminal-session","siteSpaceId":"sitesp_Th7i2","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Infrastructure Security"},{"label":"Network Infrastructure"}]},{"id":"Ar32x4p5HSetuNJX1XyM","title":"Unauthenticated Mongo DB","pathname":"/pentesting/infrastructure-security/network-infrastructure/unauthenticated-mongo-db","siteSpaceId":"sitesp_Th7i2","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Infrastructure Security"},{"label":"Network Infrastructure"}]},{"id":"Fm992kVZoabczgs3yvHI","title":"Microsoft SQL Server (MSSQL)","pathname":"/pentesting/infrastructure-security/network-infrastructure/microsoft-sql-server-mssql","siteSpaceId":"sitesp_Th7i2","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Infrastructure Security"},{"label":"Network Infrastructure"}]},{"id":"WSOUBYaTj7K5xWnqe3Ac","title":"NTP Mode 6 Vulnerabilities","pathname":"/pentesting/infrastructure-security/network-infrastructure/ntp-mode-6-vulnerabilities","siteSpaceId":"sitesp_Th7i2","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Infrastructure Security"},{"label":"Network Infrastructure"}]},{"id":"ekAT51vh0YFIhMtlMaRl","title":"BloodHound","pathname":"/pentesting/infrastructure-security/network-infrastructure/bloodhound","siteSpaceId":"sitesp_Th7i2","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Infrastructure Security"},{"label":"Network Infrastructure"}]},{"id":"CXWYIXdFk4MSHr9Cj37g","title":"AD Offensive Testing","pathname":"/pentesting/infrastructure-security/network-infrastructure/ad-offensive-testing","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Infrastructure Security"},{"label":"Network Infrastructure"}]},{"id":"aSdQPSTxPmHsy2Wu7T8f","title":"CrackMapExec","pathname":"/pentesting/infrastructure-security/network-infrastructure/crackmapexec","siteSpaceId":"sitesp_Th7i2","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Infrastructure Security"},{"label":"Network Infrastructure"}]},{"id":"h8yanLvXslnkR7VzBRkg","title":"Select all IP addresses in Sublime Text","pathname":"/pentesting/infrastructure-security/network-infrastructure/select-all-ip-addresses-in-sublime-text","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Infrastructure Security"},{"label":"Network Infrastructure"}]},{"id":"0h0FqrvRpucKsvoDFS9c","title":"Convert CIDRs to an IP address list","pathname":"/pentesting/infrastructure-security/network-infrastructure/convert-cidrs-to-an-ip-address-list","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Infrastructure Security"},{"label":"Network Infrastructure"}]},{"id":"UHThSl0uqr2iamD4ZnZC","title":"Microsoft Exchange Client Access Server Information Disclosure","pathname":"/pentesting/infrastructure-security/network-infrastructure/microsoft-exchange-client-access-server-information-disclosure","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Infrastructure Security"},{"label":"Network Infrastructure"}]},{"id":"wMWoaxN2UpQe7vMRHYKU","title":"Web Server HTTP Header Internal IP Disclosure","pathname":"/pentesting/infrastructure-security/network-infrastructure/web-server-http-header-internal-ip-disclosure","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Infrastructure Security"},{"label":"Network Infrastructure"}]},{"id":"1PvIg3981ZTuURsOBwS9","title":"smbclient.py","pathname":"/pentesting/infrastructure-security/network-infrastructure/smbclient.py","siteSpaceId":"sitesp_Th7i2","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Infrastructure Security"},{"label":"Network Infrastructure"}]},{"id":"pDqD3bv8JbqJ0YvT6OPU","title":"GetUserSPNs.py","pathname":"/pentesting/infrastructure-security/network-infrastructure/getuserspns.py","siteSpaceId":"sitesp_Th7i2","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Infrastructure Security"},{"label":"Network Infrastructure"}]},{"id":"RFqiyMhVgFIORqY9Utu0","title":"Get-GPPPassword.py","pathname":"/pentesting/infrastructure-security/network-infrastructure/get-gpppassword.py","siteSpaceId":"sitesp_Th7i2","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Infrastructure Security"},{"label":"Network Infrastructure"}]},{"id":"9xmoJ0CVILOSSaEDNgjK","title":"SMBMap","pathname":"/pentesting/infrastructure-security/network-infrastructure/smbmap","siteSpaceId":"sitesp_Th7i2","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Infrastructure Security"},{"label":"Network Infrastructure"}]},{"id":"V6qBg7s7ZBUQjx5zscol","title":"Mounting Shares","pathname":"/pentesting/infrastructure-security/network-infrastructure/mounting-shares","siteSpaceId":"sitesp_Th7i2","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Infrastructure Security"},{"label":"Network Infrastructure"}]},{"id":"fsZ5WKBbXaiTHS8gIXJ9","title":"mitm6","pathname":"/pentesting/infrastructure-security/network-infrastructure/mitm6","siteSpaceId":"sitesp_Th7i2","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Infrastructure Security"},{"label":"Network Infrastructure"}]},{"id":"1rTQbqp60EO4eSNreRM4","title":"AD Attacks","pathname":"/pentesting/infrastructure-security/network-infrastructure/ad-attacks","siteSpaceId":"sitesp_Th7i2","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Infrastructure Security"},{"label":"Network Infrastructure"}]},{"id":"X8Id8RXIJGGSFqltaWYT","title":"Weak IKE Security Configurations","pathname":"/pentesting/infrastructure-security/network-infrastructure/weak-ike-security-configurations","siteSpaceId":"sitesp_Th7i2","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Infrastructure Security"},{"label":"Network Infrastructure"}]},{"id":"fjSDDMf1AKxRqQdGdblD","title":"Locked BIOS Password Bypass","pathname":"/pentesting/infrastructure-security/network-infrastructure/locked-bios-password-bypass","siteSpaceId":"sitesp_Th7i2","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Infrastructure Security"},{"label":"Network Infrastructure"}]},{"id":"-MQZPgPM-el-zHRSJimz","title":"Wireless Security","pathname":"/pentesting/infrastructure-security/wireless-security","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Infrastructure Security"}]},{"id":"-MQZUkLJLTYzoucKKvmY","title":"Cached Wireless Keys","pathname":"/pentesting/infrastructure-security/wireless-security/cached-wireless-keys","siteSpaceId":"sitesp_Th7i2","description":"A Powershell one liner to retrieve all the WiFi passwords stored on a computer:","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Infrastructure Security"},{"label":"Wireless Security"}]},{"id":"-MQZPkAuA29OeVvEvjWT","title":"Aircrack Suite","pathname":"/pentesting/infrastructure-security/wireless-security/aircrack-suite","siteSpaceId":"sitesp_Th7i2","description":"A quick wireless testing guide using wireless security Aircrack suite.","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Infrastructure Security"},{"label":"Wireless Security"}]},{"id":"-MRQo0MF3e_z5CGZf6D7","title":"SSL/TLS Security","pathname":"/pentesting/ssl-tls-security","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"}]},{"id":"nwQeKBPQODzez19ophhZ","title":"Secure Code Review","pathname":"/pentesting/secure-code-review","siteSpaceId":"sitesp_Th7i2","description":"Secure code review is a manual or automated process that examines an application's source code. The goal of this examination is to identify any existing security flaws or vulnerabilities. Code review","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"}]},{"id":"pifj5hxjtRcFeXAZCckv","title":"Python","pathname":"/pentesting/secure-code-review/python","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Secure Code Review"}]},{"id":"Jr1DlEUkaeaCX9h0CMoR","title":"Semgrep","pathname":"/pentesting/secure-code-review/semgrep","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Secure Code Review"}]},{"id":"5ss7CLvSQe3euVQOrwFK","title":"Semgrep to HTML Report","pathname":"/pentesting/secure-code-review/semgrep/semgrep-to-html-report","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Secure Code Review"},{"label":"Semgrep"}]},{"id":"-MaIiLN5tbW3cUj4V2Ld","title":"Cloud Security","pathname":"/pentesting/cloud-security","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"}]},{"id":"-MaIiS9gdu8WcRzSdu73","title":"Cloud Penetration Testing","pathname":"/pentesting/cloud-security/cloud-penetration-testing","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Cloud Security"}]},{"id":"-MQbeeydYCX-iJ-8m2ij","title":"Social Engineering","pathname":"/pentesting/social-engineering","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"}]},{"id":"-MQbehrwx-x1PqyMXbns","title":"Simulated Phishing","pathname":"/pentesting/social-engineering/simulated-phishing","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Social Engineering"}]},{"id":"-MQbelvmH8uHquLCXIwy","title":"GoPhish","pathname":"/pentesting/social-engineering/simulated-phishing/gophish","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Social Engineering"},{"label":"Simulated Phishing"}]},{"id":"-MQ70BrxxwztkXQqwskn","title":"Tool Usage","pathname":"/pentesting/tool-usage","siteSpaceId":"sitesp_Th7i2","description":"This section consists of a set usage instructions or commands relating to a bunch of tools or scripts that are frequently used as part of security assessments.","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"}]},{"id":"-MfmVmnUC-AiMouA7Evn","title":"Docker","pathname":"/pentesting/tool-usage/docker","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Tool Usage"}]},{"id":"-MY0gK01HDQdt07t2GGr","title":"Split","pathname":"/pentesting/tool-usage/split","siteSpaceId":"sitesp_Th7i2","description":"The split command or utility allows you to split by lines, size or the number of smaller files you need. Another related utility is csplit than can also be used.","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Tool Usage"}]},{"id":"-MXxPZHw5G7uN4kfDFoh","title":"PhantomJS","pathname":"/pentesting/tool-usage/ph","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Tool Usage"}]},{"id":"-MXxN4AX_62vc-Qr40Wz","title":"Aquatone","pathname":"/pentesting/tool-usage/aquatone","siteSpaceId":"sitesp_Th7i2","description":"Aquatone is a tool for visual inspection of websites across a large amount of hosts and is convenient for quickly gaining an overview of HTTP-based attack surface.","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Tool Usage"}]},{"id":"-MXmh1NbDgoLszVjvHoM","title":"Tmux","pathname":"/pentesting/tool-usage/tmux","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Tool Usage"}]},{"id":"-MQZPLRu60LACNRNRW31","title":"Ipainstaller","pathname":"/pentesting/tool-usage/ipainstaller","siteSpaceId":"sitesp_Th7i2","description":"A tool to pull IPA files from an iOS device","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Tool Usage"}]},{"id":"-MQZKVB35NPzAaSbcOBb","title":"Public IP From Command Line","pathname":"/pentesting/tool-usage/ip-from-command-line","siteSpaceId":"sitesp_Th7i2","description":"Derive public IP address of a host from command line","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Tool Usage"}]},{"id":"-MQZK0AYhNqdkUorkK7K","title":"Wifite","pathname":"/pentesting/tool-usage/wifite","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Tool Usage"}]},{"id":"-MQZJ2xYMd7-1hEpTGJu","title":"IKE Scan","pathname":"/pentesting/tool-usage/ike-scan","siteSpaceId":"sitesp_Th7i2","description":"A basic use of ike-scan with different command based scenarios","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Tool Usage"}]},{"id":"-MQZIipbeeu86s8MLFlL","title":"Grep","pathname":"/pentesting/tool-usage/grep","siteSpaceId":"sitesp_Th7i2","description":"Optimising use of grep in different scenarios","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Tool Usage"}]},{"id":"-MQZGL2N9ulf7OXS1Tnu","title":"Pulling APKs","pathname":"/pentesting/tool-usage/pulling-apks","siteSpaceId":"sitesp_Th7i2","description":"A guide to pulling APK files from an Android device","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Tool Usage"}]},{"id":"-MQZFj55uayN9L1FvdT1","title":"Bitsadmin","pathname":"/pentesting/tool-usage/bitsadmin","siteSpaceId":"sitesp_Th7i2","description":"Using bitsadmin to download files using Windows command prompt","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Tool Usage"}]},{"id":"-MQZDKiRJBgtLkHd4vdc","title":"Drozer","pathname":"/pentesting/tool-usage/drozer","siteSpaceId":"sitesp_Th7i2","description":"An installation and wiki guide to using Drozer for Android application testing","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Tool Usage"}]},{"id":"-MQZC3LZVnxZMrFo39Bq","title":"Iptables","pathname":"/pentesting/tool-usage/iptables","siteSpaceId":"sitesp_Th7i2","description":"A mini wiki to refer to adding, delete or amending Iptables rules","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Tool Usage"}]},{"id":"-MQZBjtNwqMOfe6z_mTP","title":"Python Web Server","pathname":"/pentesting/tool-usage/python-web-server","siteSpaceId":"sitesp_Th7i2","description":"A usage wiki on how to create a Python web server on different operating systems","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Tool Usage"}]},{"id":"-MQZAtl_JjngkMwNGLYG","title":"Crackmapexec","pathname":"/pentesting/tool-usage/crackmapexec","siteSpaceId":"sitesp_Th7i2","description":"A basic wiki to use different alias and attributes of crackmapexec","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Tool Usage"}]},{"id":"-MQZAf6UJJWRiXVygo_w","title":"Impacket","pathname":"/pentesting/tool-usage/impacket","siteSpaceId":"sitesp_Th7i2","description":"A wiki to detail usage of different modules in the Impacket tool set","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Tool Usage"}]},{"id":"-MQZA3a4YfpefAtlWDN1","title":"Nessus","pathname":"/pentesting/tool-usage/nessus","siteSpaceId":"sitesp_Th7i2","description":"A small wiki about Nessus usage and associated plugins.","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Tool Usage"}]},{"id":"-MQZ8-puSzySe7FHPdmf","title":"Adding SUDO User","pathname":"/pentesting/tool-usage/adding-sudo-user","siteSpaceId":"sitesp_Th7i2","description":"Adding a user as a sudoer using command line.","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Tool Usage"}]},{"id":"-MQZ6uqAVo5T1B8g4ZZj","title":"Nmap","pathname":"/pentesting/tool-usage/nmap","siteSpaceId":"sitesp_Th7i2","description":"A short wiki of Nmap scripts and tricks to use on different scenarios","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Tool Usage"}]},{"id":"-MQZ5_kJtqdzOWoy0saN","title":"Metasploit Payloads","pathname":"/pentesting/tool-usage/metasploit-payloads","siteSpaceId":"sitesp_Th7i2","description":"A collection of Metasploit payloads using msfvenom, collected from different sources on the internet.","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Tool Usage"}]},{"id":"-MQZ4EfUwEqv6epOFAzf","title":"SMTP Open Relay","pathname":"/pentesting/tool-usage/smtp-open-relay","siteSpaceId":"sitesp_Th7i2","description":"A short walkthrough of how to use manual SMTP open relay manually and also through an nmap script.","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Tool Usage"}]},{"id":"-MQZ2v24YSfKUi57Exv1","title":"SQLMap","pathname":"/pentesting/tool-usage/sqlmap","siteSpaceId":"sitesp_Th7i2","description":"This serves as a mini SQLMap usage wiki","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Tool Usage"}]},{"id":"-MQ76lYbZ0cMzSsbqr7m","title":"Screen","pathname":"/pentesting/tool-usage/screen","siteSpaceId":"sitesp_Th7i2","description":"Screen or GNU Screen is a terminal multiplexer. In other words, it means that you can start a screen session and then open any number of windows (virtual terminals) inside that session. Processes runn","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Tool Usage"}]},{"id":"-MQ782KNYfKQ-F0F4Zwi","title":"Remove All After Colon","pathname":"/pentesting/tool-usage/remove-all-after-colon","siteSpaceId":"sitesp_Th7i2","description":"This one-liner uses the cut command to removing everything on a line after the occurrence of a colon.","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Tool Usage"}]},{"id":"-MQ7HGkV0gWNB57lVBJ7","title":"Remove Old Linux Kernels","pathname":"/pentesting/tool-usage/remove-old-linux-kernels","siteSpaceId":"sitesp_Th7i2","description":"This guide will help you remove old and unused Linux kernels on your Ubuntu system.","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Tool Usage"}]},{"id":"-MQ7SRqWmb_SyA3wygtg","title":"CURL","pathname":"/pentesting/tool-usage/curl","siteSpaceId":"sitesp_Th7i2","description":"If you are working as a security professional  support function, you must be aware of curl command usage to test for security issues across web applications, services and APIs.","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Tool Usage"}]},{"id":"-MQ7UzdOdRTHWhunRGRf","title":"Hashcat","pathname":"/pentesting/tool-usage/hashcat","siteSpaceId":"sitesp_Th7i2","description":"Hashcat is a password recovery and cracking tool. This is a quick go-to command wiki for it, although you should check the hashcat manual for extensive usage.","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Tool Usage"}]},{"id":"-MQ7WIpRoklzwv6ay432","title":"Secure Copy Protocol (SCP)","pathname":"/pentesting/tool-usage/secure-copy-protocol-scp","siteSpaceId":"sitesp_Th7i2","description":"Secure copy protocol is a means of securely transferring computer files between a local host and a remote host or between two remote hosts. It is based on the Secure Shell protocol. \"SCP\" commonly ref","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Tool Usage"}]},{"id":"-MQ7WjkpLe7xqBkJzqOt","title":"SSH & PGP Tools","pathname":"/pentesting/tool-usage/ssh-and-pgp-tools","siteSpaceId":"sitesp_Th7i2","description":"A short command list on how to use PGP or GPG, SSH key generation and how to install APT packages relating to them.","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Tool Usage"}]},{"id":"-MQ7YwiLWgByuM0jGA02","title":"IP Calculator","pathname":"/pentesting/tool-usage/ip-calculator","siteSpaceId":"sitesp_Th7i2","description":"ipcalc takes an IP address and netmask and calculates the resulting broadcast, network, Cisco wildcard mask, and host range.","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Tool Usage"}]},{"id":"-MQ7ZKSHxlh8cRPyu47P","title":"BloodHound","pathname":"/pentesting/tool-usage/bloodhound","siteSpaceId":"sitesp_Th7i2","description":"BloodHound uses graph theory to reveal the hidden and often unintended relationships within an Active Directory environment.","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Tool Usage"}]},{"id":"-MXc3fIXvvYvvVLdc27K","title":"Netcat File Transfer","pathname":"/pentesting/tool-usage/netcat-file-transfer","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Tool Usage"}]},{"id":"hwSoxPaRdpChRJKZ6VC4","title":"OpenVAS","pathname":"/pentesting/tool-usage/openvas","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Tool Usage"}]},{"id":"V9OxoXtiSxXdPvqXGDui","title":"BurpSuite","pathname":"/pentesting/tool-usage/burpsuite","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Tool Usage"}]},{"id":"Uhv3F9cX1DJDgVzAdVjy","title":"Exiftool","pathname":"/pentesting/tool-usage/exiftool","siteSpaceId":"sitesp_Th7i2","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Tool Usage"}]},{"id":"s4LhDtimXasukZt42lmx","title":"Python Virtual Environments","pathname":"/pentesting/tool-usage/python-virtual-environments","siteSpaceId":"sitesp_Th7i2","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Tool Usage"}]},{"id":"pzeImpKXFA9bJ8Fs1NeH","title":"OpenVPN 3","pathname":"/pentesting/tool-usage/openvpn-3","siteSpaceId":"sitesp_Th7i2","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Tool Usage"}]},{"id":"-MQYjdn7jZMkOBnUMQaJ","title":"Errors and Solutions","pathname":"/pentesting/errors-and-solutions","siteSpaceId":"sitesp_Th7i2","description":"This page contains random technical errors I come across and any associated solutions I've found that would have known to be either a temporary or permanent (patch or manual) fix/workaround.","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"}]},{"id":"-MQZMXqaIMWbq9c7TQL4","title":"Kill Process On Specific Port","pathname":"/pentesting/errors-and-solutions/kill-process-on-specific-port","siteSpaceId":"sitesp_Th7i2","description":"Killing a background process running on a specific port","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Errors and Solutions"}]},{"id":"-MQYrg7-rC-1VGN_BJUD","title":"Kill SSH Port Forwarding","pathname":"/pentesting/errors-and-solutions/kill-ssh-port-forwarding","siteSpaceId":"sitesp_Th7i2","description":"A small wiki to kill an SSH port forwarding process running in the background.","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Errors and Solutions"}]},{"id":"-MQYkJeVj36yVyNU2PwI","title":"SSH Key","pathname":"/pentesting/errors-and-solutions/ssh-key","siteSpaceId":"sitesp_Th7i2","description":"Error relating to no matching host key for SSH connection","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Errors and Solutions"}]},{"id":"QBGQrSRdtgAHZUacSZuc","title":"Expanding Disk on Kali VM","pathname":"/pentesting/errors-and-solutions/expanding-disk-on-kali-vm","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Errors and Solutions"}]},{"id":"-MgBkOQzrG6Vi-AGCVbG","title":"Scoping","pathname":"/pentesting/scoping","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"}]},{"id":"-MgBkS_XBQmbP7KLyn9Y","title":"Scoping Questionnaires","pathname":"/pentesting/scoping/scoping-questionnaires","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Scoping"}]},{"id":"-MgBk_U0TAOn9uDXUWx7","title":"Mobile App Testing","pathname":"/pentesting/scoping/scoping-questionnaires/mobile-app-testing","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"Scoping"},{"label":"Scoping Questionnaires"}]},{"id":"8Cb5BmpiS5uglXZTrVXS","title":"OSINT","pathname":"/pentesting/osint","siteSpaceId":"sitesp_Th7i2","description":"Open-source intelligence is the collection and analysis of data gathered from open sources to produce actionable intelligence.","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"}]},{"id":"35AkI3P9DDafLBrE2Paj","title":"Dark Web OSINT","pathname":"/pentesting/osint/dark-web-osint","siteSpaceId":"sitesp_Th7i2","description":"OSINT Tools for the Dark Web","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"OSINT"}]},{"id":"l4ndw8H4rqKQEKkbK4BD","title":"Certificate Chain Check","pathname":"/pentesting/osint/certificate-chain-check","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"OSINT"}]},{"id":"PVEzEijyh1qKRmagFEOc","title":"EyeWitness - Web Service Screenshot","pathname":"/pentesting/osint/eyewitness-web-service-screenshot","siteSpaceId":"sitesp_Th7i2","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"OSINT"}]},{"id":"OqTv2saFXKbRLdPQauJ4","title":"Tor to Browse Onion Links","pathname":"/pentesting/osint/tor-to-browse-onion-links","siteSpaceId":"sitesp_Th7i2","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"OSINT"}]},{"id":"pcJtp4mQTknv2J7r9ojy","title":"DarkDump - Scan Dark Web for Onion Links","pathname":"/pentesting/osint/darkdump-scan-dark-web-for-onion-links","siteSpaceId":"sitesp_Th7i2","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"OSINT"}]},{"id":"nYUD9kbN1MkfybD3vw4Q","title":"Domain related File Search","pathname":"/pentesting/osint/domain-related-file-search","siteSpaceId":"sitesp_Th7i2","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"OSINT"}]},{"id":"tEbcEs2YRFTLl9PfjX3p","title":"Google Dorking","pathname":"/pentesting/osint/google-dorking","siteSpaceId":"sitesp_Th7i2","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"OSINT"}]},{"id":"DSiGc4k5EbrwxzGfj7yX","title":"IP / Network Blocks owned by a Company","pathname":"/pentesting/osint/ip-network-blocks-owned-by-a-company","siteSpaceId":"sitesp_Th7i2","breadcrumbs":[{"label":"Penetration Testing","emoji":"1f47e"},{"label":"OSINT"}]},{"id":"-MXmdxeCcU0bHPaqgl_9","title":"Automation","pathname":"/programming/automation","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Programming","emoji":"2328"}]},{"id":"-MXmgqi__e7C7eRdElz0","title":"Running a Service at Boot","pathname":"/programming/automation/untitled","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Programming","emoji":"2328"},{"label":"Automation"}]},{"id":"-MXmdzY0d0SndoZAHknj","title":"Network Connectivity Cron","pathname":"/programming/automation/network-connectivity-cron","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Programming","emoji":"2328"},{"label":"Automation"}]},{"id":"-MgKeXOtiBABcleMONTg","title":"Python","pathname":"/programming/python","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Programming","emoji":"2328"}]},{"id":"-MgL2TArlCALLgisAoAR","title":"Adding Columns in Pandas","pathname":"/programming/python/adding-columns-in-pandas","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Programming","emoji":"2328"},{"label":"Python"}]},{"id":"-MgL1m5--G57z4YM0tdk","title":"Copy Entire Column Data To New Column Pandas","pathname":"/programming/python/copy-entire-column-data-to-new-column-pandas","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Programming","emoji":"2328"},{"label":"Python"}]},{"id":"-MgL-hl-7lGUf5thNVwq","title":"Loading Progress Bar","pathname":"/programming/python/loading-progress-bar","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Programming","emoji":"2328"},{"label":"Python"}]},{"id":"-MgL-0nx6ATs24DnfUUF","title":"Reorder Columns in Pandas","pathname":"/programming/python/reorder-columns-in-pandas","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Programming","emoji":"2328"},{"label":"Python"}]},{"id":"-MgKyhGg4ZsexKUBaifz","title":"Filename with Date/Time Stamp","pathname":"/programming/python/filename-with-date-time-stamp","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Programming","emoji":"2328"},{"label":"Python"}]},{"id":"-MgKn-GwJGh-ogxNhJZY","title":"Command Line Arguments","pathname":"/programming/python/command-line-arguments","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Programming","emoji":"2328"},{"label":"Python"}]},{"id":"-MgKmtpitEZJ7B9DKaEI","title":"Changing Date Format","pathname":"/programming/python/changing-date-format","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Programming","emoji":"2328"},{"label":"Python"}]},{"id":"-MgKmPzif1HEHPzJ0UoG","title":"Removing Index Column Pandas","pathname":"/programming/python/removing-index-column-pandas","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Programming","emoji":"2328"},{"label":"Python"}]},{"id":"-MgKkpKf6yXzbcBfoXXH","title":"Regex - Remove HTML Tags","pathname":"/programming/python/regex-remove-html-tags","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Programming","emoji":"2328"},{"label":"Python"}]},{"id":"-MgKgO_Lx6vnwSrungWo","title":"Column Header Mapping","pathname":"/programming/python/column-header-mapping","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Programming","emoji":"2328"},{"label":"Python"}]},{"id":"-MQZTBip7rWJN0MQLFMB","title":"Scripts","pathname":"/misc/scripts","siteSpaceId":"sitesp_Th7i2","description":"A collection of inhouse, open-source and also some third-party script collected over time to include their usage and walkthrough.","breadcrumbs":[{"label":"Miscellaneous","emoji":"1f310"}]},{"id":"-MTq_9Y04UUc88quUfcc","title":"Clickjacking Checker","pathname":"/misc/scripts/clickjacking-checker","siteSpaceId":"sitesp_Th7i2","description":"An HTML POC to ensure if a web page supports iFraming.","breadcrumbs":[{"label":"Miscellaneous","emoji":"1f310"},{"label":"Scripts"}]},{"id":"-MTqZUpT4BRlYECu-vAp","title":"Bulk WHOIS","pathname":"/misc/scripts/bulk-whois","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Miscellaneous","emoji":"1f310"},{"label":"Scripts"}]},{"id":"-MTqYPi-S4pjBQjg46_N","title":"SMB Signing Check","pathname":"/misc/scripts/smb-signing-check","siteSpaceId":"sitesp_Th7i2","description":"Script to run and parse SMB message signing results","breadcrumbs":[{"label":"Miscellaneous","emoji":"1f310"},{"label":"Scripts"}]},{"id":"-MTqWiZMDBUUINU5GKAQ","title":"FDQN to IP Address","pathname":"/misc/scripts/fdqn-from-ip-address","siteSpaceId":"sitesp_Th7i2","description":"Lookup IP Address from FQDN","breadcrumbs":[{"label":"Miscellaneous","emoji":"1f310"},{"label":"Scripts"}]},{"id":"-MTqODShvyCE7aJiIzNQ","title":"Grep IP Addresses","pathname":"/misc/scripts/grep-ip-addresses","siteSpaceId":"sitesp_Th7i2","description":"A grep command to get all IP addresses contained in a text file","breadcrumbs":[{"label":"Miscellaneous","emoji":"1f310"},{"label":"Scripts"}]},{"id":"-MQZXWUQhWPQoGoRWJf-","title":"Nessus Parser","pathname":"/misc/scripts/nessus-parser","siteSpaceId":"sitesp_Th7i2","description":"This is a program to parse a series of Nessus XMLv2 files into a XLSX file. The data from the XML file is placed into a series of tabs to for easier review and reporting.","breadcrumbs":[{"label":"Miscellaneous","emoji":"1f310"},{"label":"Scripts"}]},{"id":"-MQZV39Ncs-o0HgfjUIL","title":"Build Review Audit","pathname":"/misc/scripts/build-review-audit","siteSpaceId":"sitesp_Th7i2","description":"This script checks for various security settings / controls / policies applied on the host machine.","breadcrumbs":[{"label":"Miscellaneous","emoji":"1f310"},{"label":"Scripts"}]},{"id":"-MQZUKrmZO5jEjTfLn2O","title":"Nessus Merger","pathname":"/misc/scripts/nessus-merger","siteSpaceId":"sitesp_Th7i2","description":"Merge multiple Nessus DB output files to a single one without repetition of hosts and findings.","breadcrumbs":[{"label":"Miscellaneous","emoji":"1f310"},{"label":"Scripts"}]},{"id":"-MQZTV1thzrcEReR2q9Z","title":"Nmap2CSV","pathname":"/misc/scripts/nmap2csv","siteSpaceId":"sitesp_Th7i2","description":"Nmap2CSV is a simple Python script to convert XML Nmap or Masscan output files to a single CSV spreadsheet which summarizes all hosts and open ports in a table","breadcrumbs":[{"label":"Miscellaneous","emoji":"1f310"},{"label":"Scripts"}]},{"id":"nUNfarLtd0xWCyD3cn4i","title":"Remove Audio From Videos","pathname":"/misc/scripts/remove-audio-from-videos","siteSpaceId":"sitesp_Th7i2","description":"Remove audio from video files in bulk","breadcrumbs":[{"label":"Miscellaneous","emoji":"1f310"},{"label":"Scripts"}]},{"id":"0FWGK9xfMOvNHhU0TNys","title":"Compressing PDF Files using MacOS or Linux","pathname":"/misc/scripts/compressing-pdf-files-using-macos-or-linux","siteSpaceId":"sitesp_Th7i2","breadcrumbs":[{"label":"Miscellaneous","emoji":"1f310"},{"label":"Scripts"}]},{"id":"-MaIc-BNmP6eMz_bgVq6","title":"Favourite Reads/Links","pathname":"/misc/favourite-reads-links","siteSpaceId":"sitesp_Th7i2","description":"A collated list of my favourite cybersecurity reads/links I like to refer to and keep myself enlightened with.","breadcrumbs":[{"label":"Miscellaneous","emoji":"1f310"}]},{"id":"-MYKhtt-3CJ0lK-fNUCM","title":"Hacking Posters","pathname":"/misc/hacking-posters","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Miscellaneous","emoji":"1f310"}]},{"id":"-MXmgZSH28SL_NgMG64R","title":"Windows Developer VMs","pathname":"/misc/windows-developer-vms","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Miscellaneous","emoji":"1f310"}]},{"id":"-MQZN2kF6WATkbJ5Xz-c","title":"Windows Workspaces","pathname":"/misc/windows-workspaces","siteSpaceId":"sitesp_Th7i2","description":"A mini guide on usage of windows workspaces","breadcrumbs":[{"label":"Miscellaneous","emoji":"1f310"}]},{"id":"-MQYpaQnwzD7Uz9iek7k","title":"GitHub Pages","pathname":"/misc/github-pages","siteSpaceId":"sitesp_Th7i2","description":"A short walkthrough of how to setup GitHub pages for local editing and some references of similar GitHub based websites and portals.","breadcrumbs":[{"label":"Miscellaneous","emoji":"1f310"}]},{"id":"-MRQk3Xz6no8N0Ab5jVu","title":"Interview Prep","pathname":"/misc/interview-prep","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Miscellaneous","emoji":"1f310"}]},{"id":"-MRQk5n4shq8HTR1cDFN","title":"Senior Penetration Tester","pathname":"/misc/interview-prep/senior-penetration-tester","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Miscellaneous","emoji":"1f310"},{"label":"Interview Prep"}]},{"id":"-MRQqMXTtE3pMFcm_bCV","title":"CVSS Formula","pathname":"/misc/cvss-formula","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Miscellaneous","emoji":"1f310"}]},{"id":"4dfg2RtF3iYyrSgLI9qt","title":"Android Rooting","pathname":"/misc/android-rooting","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Miscellaneous","emoji":"1f310"}]},{"id":"4joIgxeTCTm5AwrQjhx4","title":"Lineage OS 18.1 on OnePlus X","pathname":"/misc/android-rooting/lineage-os-18.1-on-oneplus-x","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Miscellaneous","emoji":"1f310"},{"label":"Android Rooting"}]},{"id":"LXb9OTBSRXjugI86Z70y","title":"TWRP Recover on OnePlus X","pathname":"/misc/android-rooting/twrp-recover-on-oneplus-x","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Miscellaneous","emoji":"1f310"},{"label":"Android Rooting"}]},{"id":"giOHuZkQDnwzrYzKm62o","title":"Magisk Rooting","pathname":"/misc/android-rooting/magisk-rooting","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Miscellaneous","emoji":"1f310"},{"label":"Android Rooting"}]},{"id":"ooarQqGAZ1W6G1UwA5zi","title":"Presentation Slides","pathname":"/misc/presentation-slides","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Miscellaneous","emoji":"1f310"}]},{"id":"ucWsIqRbAkCRDAfIr7In","title":"BlackHat - USA [2022]","pathname":"/misc/presentation-slides/blackhat-usa-2022","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Miscellaneous","emoji":"1f310"},{"label":"Presentation Slides"}]},{"id":"nWS5GO0DCqFSmKbUleEp","title":"APPLICATION LEVEL","pathname":"/vulnerability-wiki/application-level","siteSpaceId":"sitesp_Th7i2","emoji":"1f310","description":"","breadcrumbs":[{"label":"Vulnerability Wiki","emoji":"1f41e"}]},{"id":"MlMYUFtMydrrtq61KFv6","title":"AUTHENTICATION","pathname":"/vulnerability-wiki/application-level/authentication","siteSpaceId":"sitesp_Th7i2","emoji":"1f512","description":"","breadcrumbs":[{"label":"Vulnerability Wiki","emoji":"1f41e"},{"label":"APPLICATION LEVEL","emoji":"1f310"}]},{"id":"JguOvcmjMRYzPBW65YyF","title":"Authentication Bypass","pathname":"/vulnerability-wiki/application-level/authentication/authentication-bypass","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Vulnerability Wiki","emoji":"1f41e"},{"label":"APPLICATION LEVEL","emoji":"1f310"},{"label":"AUTHENTICATION","emoji":"1f512"}]},{"id":"iEtACmiylGFXiQGeDg7F","title":"Lack of Password Confirmation","pathname":"/vulnerability-wiki/application-level/authentication/lack-of-password-confirmation","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Vulnerability Wiki","emoji":"1f41e"},{"label":"APPLICATION LEVEL","emoji":"1f310"},{"label":"AUTHENTICATION","emoji":"1f512"}]},{"id":"3E6AnpJggeKIOnQTNKxc","title":"2FA Code Brute-forceable","pathname":"/vulnerability-wiki/application-level/authentication/2fa-code-brute-forceable","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Vulnerability Wiki","emoji":"1f41e"},{"label":"APPLICATION LEVEL","emoji":"1f310"},{"label":"AUTHENTICATION","emoji":"1f512"}]},{"id":"GLtwz9lLwwg1fIrJWZFk","title":"Lack of Verification","pathname":"/vulnerability-wiki/application-level/authentication/lack-of-verification","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Vulnerability Wiki","emoji":"1f41e"},{"label":"APPLICATION LEVEL","emoji":"1f310"},{"label":"AUTHENTICATION","emoji":"1f512"}]},{"id":"BnKljdYPyxklRf3ERF0Y","title":"Lack of Throttling on Form Submissions","pathname":"/vulnerability-wiki/application-level/authentication/lack-of-throttling-on-form-submissions","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Vulnerability Wiki","emoji":"1f41e"},{"label":"APPLICATION LEVEL","emoji":"1f310"},{"label":"AUTHENTICATION","emoji":"1f512"}]},{"id":"zghj6Z3FAh7ZxXYl0Jns","title":"Lack of Rate Limiting on Login","pathname":"/vulnerability-wiki/application-level/authentication/lack-of-rate-limiting-on-login","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Vulnerability Wiki","emoji":"1f41e"},{"label":"APPLICATION LEVEL","emoji":"1f310"},{"label":"AUTHENTICATION","emoji":"1f512"}]},{"id":"8OhSGf2vPr107cvrr6f6","title":"Weak Password Complexity Rules","pathname":"/vulnerability-wiki/application-level/authentication/weak-password-complexity-rules","siteSpaceId":"sitesp_Th7i2","description":"","breadcrumbs":[{"label":"Vulnerability Wiki","emoji":"1f41e"},{"label":"APPLICATION LEVEL","emoji":"1f310"},{"label":"AUTHENTICATION","emoji":"1f512"}]},{"id":"F7NfuHp2AbAErhaWpmfT","title":"SESSION MANAGEMENT","pathname":"/vulnerability-wiki/application-level/authentication/session-management","siteSpaceId":"sitesp_Th7i2","emoji":"1f5a5","description":"","breadcrumbs":[{"label":"Vulnerability Wiki","emoji":"1f41e"},{"label":"APPLICATION LEVEL","emoji":"1f310"},{"label":"AUTHENTICATION","emoji":"1f512"}]},{"id":"Yq6MKMsIuI9KZAELd2iq","title":"ACCESS CONTROL","pathname":"/vulnerability-wiki/application-level/authentication/access-control","siteSpaceId":"sitesp_Th7i2","emoji":"1f511","description":"","breadcrumbs":[{"label":"Vulnerability Wiki","emoji":"1f41e"},{"label":"APPLICATION LEVEL","emoji":"1f310"},{"label":"AUTHENTICATION","emoji":"1f512"}]},{"id":"ETqnuJf3rhS4wHxtVqF1","title":"INPUT VALIDATION","pathname":"/vulnerability-wiki/application-level/input-validation","siteSpaceId":"sitesp_Th7i2","emoji":"1f522","description":"","breadcrumbs":[{"label":"Vulnerability Wiki","emoji":"1f41e"},{"label":"APPLICATION LEVEL","emoji":"1f310"}]},{"id":"0ezdxT13d4lR9JvaUzvo","title":"CRYPTOGRAPHY","pathname":"/vulnerability-wiki/application-level/cryptography","siteSpaceId":"sitesp_Th7i2","emoji":"2797","description":"","breadcrumbs":[{"label":"Vulnerability Wiki","emoji":"1f41e"},{"label":"APPLICATION LEVEL","emoji":"1f310"}]},{"id":"q9mirSG9GPKYgJ07bhnh","title":"LOGGING","pathname":"/vulnerability-wiki/application-level/logging","siteSpaceId":"sitesp_Th7i2","emoji":"1f4c9","description":"","breadcrumbs":[{"label":"Vulnerability Wiki","emoji":"1f41e"},{"label":"APPLICATION LEVEL","emoji":"1f310"}]},{"id":"L6qh5NTDSc21q9pSXzyI","title":"DATA PROTECTION","pathname":"/vulnerability-wiki/application-level/data-protection","siteSpaceId":"sitesp_Th7i2","emoji":"1f4d5","description":"","breadcrumbs":[{"label":"Vulnerability Wiki","emoji":"1f41e"},{"label":"APPLICATION LEVEL","emoji":"1f310"}]},{"id":"wRUoNXoRexDldBm4DQEg","title":"COMMUNICATION","pathname":"/vulnerability-wiki/application-level/communication","siteSpaceId":"sitesp_Th7i2","emoji":"1f4f2","description":"","breadcrumbs":[{"label":"Vulnerability Wiki","emoji":"1f41e"},{"label":"APPLICATION LEVEL","emoji":"1f310"}]},{"id":"mHIWju7sA7KjJzDnpSJY","title":"MALICIOUS CODE","pathname":"/vulnerability-wiki/application-level/malicious-code","siteSpaceId":"sitesp_Th7i2","emoji":"1f468-1f4bb","description":"","breadcrumbs":[{"label":"Vulnerability Wiki","emoji":"1f41e"},{"label":"APPLICATION LEVEL","emoji":"1f310"}]},{"id":"W6L1HazSbTwhiDlyqcOF","title":"LOGIC","pathname":"/vulnerability-wiki/application-level/logic","siteSpaceId":"sitesp_Th7i2","emoji":"1f4a1","description":"","breadcrumbs":[{"label":"Vulnerability Wiki","emoji":"1f41e"},{"label":"APPLICATION LEVEL","emoji":"1f310"}]},{"id":"IaJub7eVtnLrkEqMAmIK","title":"FILE UPLOAD","pathname":"/vulnerability-wiki/application-level/file-upload","siteSpaceId":"sitesp_Th7i2","emoji":"1f5c4","description":"","breadcrumbs":[{"label":"Vulnerability Wiki","emoji":"1f41e"},{"label":"APPLICATION LEVEL","emoji":"1f310"}]},{"id":"A1uS0aWuh6OaVEZxOcfe","title":"API ISSUES","pathname":"/vulnerability-wiki/application-level/api-issues","siteSpaceId":"sitesp_Th7i2","emoji":"2699","description":"","breadcrumbs":[{"label":"Vulnerability Wiki","emoji":"1f41e"},{"label":"APPLICATION LEVEL","emoji":"1f310"}]},{"id":"9AKnDNw4aShOCBklww5G","title":"CONFIGURATIONS","pathname":"/vulnerability-wiki/application-level/configurations","siteSpaceId":"sitesp_Th7i2","emoji":"1f50d","description":"","breadcrumbs":[{"label":"Vulnerability Wiki","emoji":"1f41e"},{"label":"APPLICATION LEVEL","emoji":"1f310"}]},{"id":"0QbsafJCrkVVD5QxsU1n","title":"INFRASTRUCTURE LEVEL","pathname":"/vulnerability-wiki/infrastructure-level","siteSpaceId":"sitesp_Th7i2","emoji":"1f4be","description":"","breadcrumbs":[{"label":"Vulnerability Wiki","emoji":"1f41e"}]},{"id":"npE0qAk3u6syLwesDVDs","title":"ICMP Timestamp Request Remote Date Disclosure (CVE-1999-0524)","pathname":"/vulnerability-wiki/infrastructure-level/icmp-timestamp-request-remote-date-disclosure-cve-1999-0524","siteSpaceId":"sitesp_Th7i2","breadcrumbs":[{"label":"Vulnerability Wiki","emoji":"1f41e"},{"label":"INFRASTRUCTURE LEVEL","emoji":"1f4be"}]},{"id":"fzLmMQHZFFQbd2t3WpEO","title":"ASP.NET Debug Mode Validation","pathname":"/vulnerability-wiki/infrastructure-level/asp.net-debug-mode-validation","siteSpaceId":"sitesp_Th7i2","breadcrumbs":[{"label":"Vulnerability Wiki","emoji":"1f41e"},{"label":"INFRASTRUCTURE LEVEL","emoji":"1f4be"}]}]}