<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Thu, 16 Apr 2026 02:50:00 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/offensive-security/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Walkthrough for DerpNStink - A Vulnerable Machine from Vulnhub - [Part 2]]]></title><description><![CDATA[In the previous demonstration, the first part of this walkthrough for DerpNStink vulnerable machine, we've managed to get inside the server by exploiting different services. Now, in this part, our purpose]]></description><link>http://direct.ecency.com/cybersecurity/@cristi/walkthrough-for-derpnstink-a-vulnerable-machine-from-vulnhub-part-2</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@cristi/walkthrough-for-derpnstink-a-vulnerable-machine-from-vulnhub-part-2</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[cristi]]></dc:creator><pubDate>Sun, 27 May 2018 12:35:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eMDqMaQPGitFwwqmqFeg9SyUXXg223C5fSN?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Practical Malware Analysis - Lecture 5 - [Prof. Sam Bowne]]]></title><description><![CDATA[Ok, so if you've been following my stuff, you know that I'm into Professor Sam Bowne's course from the Community College of San Francisco. So far, we've been going through some basics in this class, such]]></description><link>http://direct.ecency.com/cybersecurity/@cristi/practical-malware-analysis-lecture-5-prof-sam-bowne</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@cristi/practical-malware-analysis-lecture-5-prof-sam-bowne</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[cristi]]></dc:creator><pubDate>Sat, 26 May 2018 12:01:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eFvLFRAJv8Hb1LtDGdFC42Ky8HeJFiNFUsg?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Walkthrough for Shocker - A Vulnerable Machine [HackTheBox]]]></title><description><![CDATA[In this video I demonstrate how I get into and own a vulnerable virtual machine from hackthebox.eu. This box, as its name might suggest, is vulnerable to a shellshock exploit. For those who don't know,]]></description><link>http://direct.ecency.com/cybersecurity/@cristi/walkthrough-for-shocker-a-vulnerable-machine-hackthebox</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@cristi/walkthrough-for-shocker-a-vulnerable-machine-hackthebox</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[cristi]]></dc:creator><pubDate>Wed, 23 May 2018 11:20:42 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eLph6NEk9yAW1H2LjAvL2hfqHpGrxPRm1zW?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Pentesting Environment under Windows - [PentestBox]]]></title><description><![CDATA[Alexis Ahmed from Hackersploit youtube channel just made a insightful review on PentestBox, that was just recently released. So, the premise behind PentestBox is that it comes as a very good lightweight]]></description><link>http://direct.ecency.com/cybersecurity/@cristi/pentesting-environment-under-windows-pentestbox</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@cristi/pentesting-environment-under-windows-pentestbox</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[cristi]]></dc:creator><pubDate>Sun, 20 May 2018 12:00:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45dy3n3bHgMwkaoV7XrYGRUU7VzzJmpRCWXUS?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Beginning Exploit Development - [Prof. Sam Bowne]]]></title><description><![CDATA[Here's another one from my favorite professor in information security. So, in this hour long workshop, Professor Sam Bowne at CCSF, teaches folks at Toro.hack the basic of developing exploits - from a]]></description><link>http://direct.ecency.com/cybersecurity/@cristi/beginning-exploit-development-prof-sam-bowne</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@cristi/beginning-exploit-development-prof-sam-bowne</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[cristi]]></dc:creator><pubDate>Sat, 19 May 2018 14:44:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eNnSpNofJ2QzohKqssimjNAYp7i7pNAs6ii?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Walkthrough for DerpNStink - A Vulnerable Machine from Vulnhub - [Part 1]]]></title><description><![CDATA[In this video I demonstrate a penetration testing assessment on a vulnerable machine from vulnhub.com. This machine is called DerpNStink and I enjoyed working on it a lot. In the first part of this]]></description><link>http://direct.ecency.com/cybersecurity/@cristi/walkthrough-for-derpnstink-a-vulnerable-machine-from-vulnhub-part-1</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@cristi/walkthrough-for-derpnstink-a-vulnerable-machine-from-vulnhub-part-1</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[cristi]]></dc:creator><pubDate>Fri, 18 May 2018 11:47:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eEHdPQRe4xiRgQWyBJQDFC9UJSXwABFJ4kv?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Walkthrough for LAME - A Vulnerable Machine [HackTheBox]]]></title><description><![CDATA[In this video walkthrough I'm going to demonstrate another vulnerable machine from hackthebox.eu. For those of you who don't know, HackTheBox is a platform where cyber-security professionals can grow their]]></description><link>http://direct.ecency.com/cybersecurity/@cristi/walkthrough-for-lame-a-vulnerable-machine-hackthebox</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@cristi/walkthrough-for-lame-a-vulnerable-machine-hackthebox</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[cristi]]></dc:creator><pubDate>Tue, 15 May 2018 11:04:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45dwon1ZsKvYptu5xghFEy2BXvDw52rUrxnSa?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[JIS-CTF Walkthrough - Yet Another Cybersecurity Video]]></title><description><![CDATA[In this video I demonstrate how to get into a webserver through an unsanitized file upload functionality. First, we're dealing with a server for which the access to the administrator panel is easily achieved.]]></description><link>http://direct.ecency.com/cybersecurity/@cristi/jis-ctf-walkthrough-yet-another-cybersecurity-video</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@cristi/jis-ctf-walkthrough-yet-another-cybersecurity-video</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[cristi]]></dc:creator><pubDate>Fri, 20 Apr 2018 13:20:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/3HaJVw3AYyXBD5Md5tUD9YKkzGo1eoR2RP1hYxRaFr2EtYK8jE786PiXp8YoAovvxSH2pigDVYcP4CipH4k8DqA5La6CwhVfXpwptj6?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Privilege Escalation on Hackademic_RTB1 - A CTF Walkthrough]]></title><description><![CDATA[This is the second part for the walkthrough of the vulnerable machine HTB from vulnhub. In the first video I showed that to get inside this machine we exploited an SQL injection vulnerability. We obtained]]></description><link>http://direct.ecency.com/cybersecurity/@cristi/privilege-escalation-on-hackademicrtb1-a-ctf-walkthrough</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@cristi/privilege-escalation-on-hackademicrtb1-a-ctf-walkthrough</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[cristi]]></dc:creator><pubDate>Mon, 16 Apr 2018 13:17:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45e3VcGkWyeFxoxydHFzLj9b9u61HZBafZD6N?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Disassembling Binaries with IDA - [A Reverse Engineering Tutorial]]]></title><description><![CDATA[In my penetration testing training, I'm currently working on a vulnerable machine that doesn't seem to have too many ways in. There are only 2 open ports, both for web services. I was able to extract a]]></description><link>http://direct.ecency.com/programming/@cristi/disassembling-binaries-with-ida-a-reverse-engineering-tutorial</link><guid isPermaLink="true">http://direct.ecency.com/programming/@cristi/disassembling-binaries-with-ida-a-reverse-engineering-tutorial</guid><category><![CDATA[programming]]></category><dc:creator><![CDATA[cristi]]></dc:creator><pubDate>Wed, 14 Feb 2018 12:41:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/2FFvzA2zeqoVZ5NRzV2o8MyJEzowAL6rjbt8w3dTGq7UfgC3dyKHtVxxYQCS2KSs1541XW52SFev7ac6LqyDZYzV3sDYop6j5NRsTCS9m5DX7KoUindhbo2SH8mKk?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[A Collection of Vulnerable Machines for Penetration Testing and Offensive Security - [Vulnhub]]]></title><description><![CDATA[If you're into offensive security, one of the best places to safely practice your craft is Vulnhub, which is a collection of virtual machines which are vulnerable by design. What do I mean by that? Well,]]></description><link>http://direct.ecency.com/offensive-security/@cristi/a-collection-of-vulnerable-machines-for-penetration-testing-and-offensive-security-vulnhub</link><guid isPermaLink="true">http://direct.ecency.com/offensive-security/@cristi/a-collection-of-vulnerable-machines-for-penetration-testing-and-offensive-security-vulnhub</guid><category><![CDATA[offensive-security]]></category><dc:creator><![CDATA[cristi]]></dc:creator><pubDate>Sat, 10 Feb 2018 15:23:24 GMT</pubDate><enclosure url="https://images.ecency.com/p/2FFvzA2zeqoVZ5NRzV2o8MyJEzowAL6rjbt8w3dTGwtA8EsekJJTLqB4JdcZQ1EF5f8bQ5Ue4QSjfwjcEDywpjNtovsEr5Ne3EArt7SunuvdpVznpD5tzVRCT194S?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>