Conper
  • Home
  • Writeups
  • Crackmes
  • My Projects
  • Cybersecurity
  • IT
  • About Me
  • Search

Hacking

🕵️ Reconnaissance & Enumeration

Gathering information about the target through passive and active methods, including OSINT, network scanning, fuzzing, and service discovery.

🌐 Web Vulnerabilities

Identifying and exploiting security flaws in web applications, such as SQL injection, XSS, file inclusion, SSTI, SSRF, and other web-based attacks.

💥 System & Service Exploitation

Attacking operating systems, network services, and applications to gain unauthorized access, including insecure deserialization, buffer overflows, and CMS exploits.

🔐 Cracking & Brute Force

Breaking passwords and encryption through dictionary attacks, brute-force methods, hash cracking, and credential stuffing techniques.

🪟 Windows & Active Directory Hacking

Comprehensive overview of hacking techniques targeting Windows environments, including Active Directory exploitation, privilege escalation, lateral movement, and post-exploitation.

🔝 Privilege Escalation

Gaining higher-level permissions on compromised systems by exploiting misconfigurations, vulnerabilities, or insecure practices in Linux and Windows environments.

💻 Post-Exploitation (⚠ UNDER CONSTRUCTION ⚠)

© 2025 Conper