- Get the reverse shell in netcat
- check python support in the target system
which python
- If your terminal is using zsh, then you need to switch to bash
# -*- mode: ruby -*- | |
# vi: set ft=ruby : | |
Vagrant.configure("2") do |config| | |
config.vm.box = "ubuntu/xenial64" | |
config.vm.box_check_update = false | |
# Spark Jobs history | |
config.vm.network "forwarded_port", guest: 4040, host: 4040 | |
# Spark Master | |
config.vm.network "forwarded_port", guest: 8080, host: 8080 |
#!/bin/bash | |
# Enabling ADB over network | |
# adb kill-server && adb start-server # restart adb server | |
# adb tcpip 5555 # start adb service | |
# adb connect <phone_id> # connect to the device | |
# For enabling loudspeaker and cut the call, make sure to change it based on your phone screen | |
# Ref for getting touch coordinates: https://android.stackexchange.com/questions/164295/how-can-i-see-the-pointer-location-and-simulate-it |
TOTP (Time-Based One-Time Password) is a one-time password algorithm that uses the current time as a variable. It is commonly used in two-factor authentication (2FA) systems. TOTP generates a numeric code that changes every 30 seconds and is based on a shared secret between the client and the server.
Check | Description |
---|---|
X-Frame-Options header | Should be set to DENY or SAMEORIGIN to prevent Clickjacking. |
Content-Security-Policy (CSP) | Use frame-ancestors , child-src , frame-src directives to restrict embedding origins. |
Sandboxing iframes | Use sandbox attribute with strict flags like allow-scripts or allow-forms . |
SAML is primarily used for single sign-on (SSO) and authentication within enterprise environments
SAMLRequest
and redirects to IdP.This checklist covers key GraphQL concepts such as queries, mutations, subscriptions, introspection, variables, fields, types, and arguments, along with related vulnerability assessment and penetration testing pointers.
Standard read operations used to fetch data.