Conper
  • Home
  • Writeups
  • Crackmes
  • My Projects
  • Cybersecurity
  • IT
  • About Me

Hacking

๐Ÿ•ต๏ธ Reconnaissance & Enumeration

Gathering information about the target through passive and active methods, including OSINT, network scanning, fuzzing, and service discovery.

๐ŸŒ Web Vulnerabilities

Identifying and exploiting security flaws in web applications, such as SQL injection, XSS, file inclusion, SSTI, SSRF, and other web-based attacks.

๐Ÿ’ฅ System & Service Exploitation

Attacking operating systems, network services, and applications to gain unauthorized access, including insecure deserialization, buffer overflows, and CMS exploits.

๐Ÿ” Cracking & Brute Force

Breaking passwords and encryption through dictionary attacks, brute-force methods, hash cracking, and credential stuffing techniques.

๐ŸชŸ Windows & Active Directory Hacking

Comprehensive overview of hacking techniques targeting Windows environments, including Active Directory exploitation, privilege escalation, lateral movement, and post-exploitation.

๐Ÿ” Privilege Escalation

Gaining higher-level permissions on compromised systems by exploiting misconfigurations, vulnerabilities, or insecure practices in Linux and Windows environments.

๐Ÿ’ป Post-Exploitation (โš  UNDER CONSTRUCTION โš )

© 2025 Conper ยท Powered by Hugo & PaperMod