theAwful
CtrlK
  • Introduction
  • Internals
    • Responder
    • mitm6
    • Password Spraying
    • CME/NXC Cheatsheet
    • Kerberoasting
    • AS-REP Roasting
    • Dumping NTDS
  • Metasploit Payload and Listener
    • Encoder
    • Word Macros
    • Payloads
    • Metasploit Modules
  • OSEP Cheat Sheet
  • OSEP Challenges
  • C2
  • Privilege Escalation
    • PowerUp
    • Privilege Escalation
  • Windows Local Recon
  • Linux Local Recon
  • File Transfer & Execution
  • Phishing
  • Ansible/Jfrog
  • Pivoting
  • Pass-the-hash
  • Remote Access
  • Post-Exploitation
  • Credentials
  • Lateral Movement
  • Domain Enumeration
    • Users and Computers
    • ACLs
    • BloodHound
    • GPO
    • Trusts
    • User Hunting
  • Active Directory
    • Domain Recon - Kali
    • Domain Recon - Windows
    • Trusts
    • ADCS
  • Web Application Testing
    • OWASP Testing Checklist
    • Host Headers
    • WAF Bypasses
    • Template Injection
    • Prototype Pollution
    • Autorize
    • SQLmap
    • SSRF
    • File Uploads
    • Command Injection
    • XXE
    • CSRF
    • XSS
  • OSWE
    • OSWE Code Review Cheat Sheet
    • Exploit Writing
    • ManageEngine (SQLi)
    • OpenCRX (Auth Bypass -> XXE)
    • DotNetNuke (Deserialization RCE)
    • ERPNext (SQLi -> SSTI)
    • Challenges
      • Notebook
      • Erka
      • DocEdit
      • Answers
      • Gallery
      • Chat
      • Sqeakr
  • MOBILE APPS
    • iOS
    • Android
  • Exploit Dev
    • AMSI Bypass
    • VBA Obfuscate
    • APC Injection
    • EarlyBird Injection
  • DFIR
    • Malware Analysis
    • Memory Analysis
    • Registry Analysis
    • Behavior Analysis
    • Filesystems
  • VISUAL STUDIO
    • Tricks
  • Scripts and Tools
    • Grep IPs from DNS ping
    • OSINT.sh
Powered by GitBook
On this page
  1. OSWE
  2. Challenges

Erka

PreviousNotebookNextDocEdit