{"version":1,"pages":[{"id":"AACl0UeoGuvCVzgEymi5","title":"VeryLazyTech Hacking Guide","pathname":"/","siteSpaceId":"sitesp_16SC1","description":"🔒 Welcome to VeryLazyTech's Cybersecurity Corner! 🔒","breadcrumbs":[{"label":"Welcome!","emoji":"1f575"}]},{"id":"frCriuCa3KW6hYZMtDNk","title":"Support VeryLazyTech","pathname":"/welcome/support-verylazytech","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Welcome!","emoji":"1f575"}]},{"id":"CyH2xJQs9yWJ1S8BYNav","title":"CVE - POC","pathname":"/vulnerabilities-and-exploits/cve-poc","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"🛡️ Vulnerabilities and Exploits"}]},{"id":"JjjojIyKxaiBPzzLwvtg","title":"Unauthenticated RCE Flaw in Rejetto HTTP File Server - CVE-2024-23692","pathname":"/vulnerabilities-and-exploits/cve-poc/cve-2024-23692","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"🛡️ Vulnerabilities and Exploits"},{"label":"CVE - POC"}]},{"id":"GATD4GQN356kVXGyqWAD","title":"POC - CVE-2024–4956 - Nexus Repository Manager 3 Unauthenticated Path Traversal","pathname":"/vulnerabilities-and-exploits/cve-poc/poc-cve-2024-4956-nexus-repository-manager-3-unauthenticated-path-traversal","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"🛡️ Vulnerabilities and Exploits"},{"label":"CVE - POC"}]},{"id":"gXGiOekjQjQWmMcU58S0","title":"POC - CVE-2024-45241: Path Traversal in CentralSquare's CryWolf","pathname":"/vulnerabilities-and-exploits/cve-poc/poc-cve-2024-45241-path-traversal-in-centralsquares-crywolf","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"🛡️ Vulnerabilities and Exploits"},{"label":"CVE - POC"}]},{"id":"njoeofMNooZmbpYDDKGX","title":"Telerik Auth Bypass CVE-2024-4358","pathname":"/vulnerabilities-and-exploits/cve-poc/telerik-auth-bypass-cve-2024-4358","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"🛡️ Vulnerabilities and Exploits"},{"label":"CVE - POC"}]},{"id":"m6MeZCOCFj8FXlnNY6cO","title":"Check Point Security Gateways Information Disclosure - CVE-2024-24919","pathname":"/vulnerabilities-and-exploits/cve-poc/check-point-security-gateways-information-disclosure-cve-2024-24919","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"🛡️ Vulnerabilities and Exploits"},{"label":"CVE - POC"}]},{"id":"O54GQorrgcZGne8T2apA","title":"CVE-2024-23897 - Jenkins File Read Vulnerability","pathname":"/vulnerabilities-and-exploits/cve-poc/cve-2024-23897-jenkins-file-read-vulnerability","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"🛡️ Vulnerabilities and Exploits"},{"label":"CVE - POC"}]},{"id":"JtRz5R7OYcQz77FezILy","title":"CVE-2024–10914- Command Injection Vulnerability in name parameter for D-Link NAS","pathname":"/vulnerabilities-and-exploits/cve-poc/cve-2024-10914-command-injection-vulnerability-in-name-parameter-for-d-link-nas","siteSpaceId":"sitesp_16SC1","description":"POC - CVE-2024–10914 - Command Injection Vulnerability in name parameter for D-Link NAS","breadcrumbs":[{"label":"🛡️ Vulnerabilities and Exploits"},{"label":"CVE - POC"}]},{"id":"5KAlWgPbeF6h6df7enA8","title":"POC - CVE-2024-21534 Jsonpath-plus vulnerable to Remote Code Execution (RCE)","pathname":"/vulnerabilities-and-exploits/cve-poc/poc-cve-2024-21534-jsonpath-plus-vulnerable-to-remote-code-execution-rce","siteSpaceId":"sitesp_16SC1","description":"POC - CVE-2024-21534 Jsonpath-plus vulnerable to Remote Code Execution (RCE) due to improper input sanitization","breadcrumbs":[{"label":"🛡️ Vulnerabilities and Exploits"},{"label":"CVE - POC"}]},{"id":"erI9nDrl2b9Zkjbsendq","title":"CVE-2024-9935 - PDF Generator Addon for Elementor Page Builder <= 1.7.5 - Unauthenticated Arbitrary","pathname":"/vulnerabilities-and-exploits/cve-poc/cve-2024-9935-pdf-generator-addon-for-elementor-page-builder-less-than-1.7.5-unauthenticated-arbitra","siteSpaceId":"sitesp_16SC1","description":"POC - CVE-2024-9935 - PDF Generator Addon for Elementor Page Builder <= 1.7.5 - Unauthenticated Arbitrary","breadcrumbs":[{"label":"🛡️ Vulnerabilities and Exploits"},{"label":"CVE - POC"}]},{"id":"TON6OEWlEhU5lTmi4Y5o","title":"CVE-2024-50623- Cleo Unrestricted file upload and download","pathname":"/vulnerabilities-and-exploits/cve-poc/cve-2024-50623-cleo-unrestricted-file-upload-and-download","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"🛡️ Vulnerabilities and Exploits"},{"label":"CVE - POC"}]},{"id":"xqu3WneONob6aMuaQhwh","title":"POC - WordPress File Upload plugin, in the wfu_file_downloader.php file before version <= 4.24.11","pathname":"/vulnerabilities-and-exploits/cve-poc/poc-wordpress-file-upload-plugin-in-the-wfu_file_downloader.php-file-before-version-less-than-4.24.1","siteSpaceId":"sitesp_16SC1","description":"WordPress File Upload plugin, in the wfu_file_downloader.php file before version <= 4.24.11","breadcrumbs":[{"label":"🛡️ Vulnerabilities and Exploits"},{"label":"CVE - POC"}]},{"id":"PBfSxUbpG7nW49tWuavO","title":"POC - Remote and unauthenticated attacker can send crafted HTTP requests to RCE - cve-2025-3248","pathname":"/vulnerabilities-and-exploits/cve-poc/poc-remote-and-unauthenticated-attacker-can-send-crafted-http-requests-to-rce-cve-2025-3248","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"🛡️ Vulnerabilities and Exploits"},{"label":"CVE - POC"}]},{"id":"zmK5L4I7gtIciU1uJFXd","title":"POC - CVE-2025–2539 File Away <= 3.9.9.0.1 - Missing Authorization to Unauthenticated Arbitrary File","pathname":"/vulnerabilities-and-exploits/cve-poc/poc-cve-2025-2539-file-away-less-than-3.9.9.0.1-missing-authorization-to-unauthenticated-arbitrary-f","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"🛡️ Vulnerabilities and Exploits"},{"label":"CVE - POC"}]},{"id":"aBnywCLDfz5iqdXHR6f7","title":"POC - CVE-2025-29306 FOXCMS /images/index.html Code Execution Vulnerability","pathname":"/vulnerabilities-and-exploits/cve-poc/poc-cve-2025-29306-foxcms-images-index.html-code-execution-vulnerability","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"🛡️ Vulnerabilities and Exploits"},{"label":"CVE - POC"}]},{"id":"cKNSrLn9hU7arlltGRCr","title":"CVE-2025–64446 — A Red Team Offensive Playbook for FortiWeb RCE via Path Traversal + Authentication","pathname":"/vulnerabilities-and-exploits/cve-poc/cve-2025-64446-a-red-team-offensive-playbook-for-fortiweb-rce-via-path-traversal-+-authentication","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"🛡️ Vulnerabilities and Exploits"},{"label":"CVE - POC"}]},{"id":"j3bOjmXpZiFkXNP2dEuQ","title":"GitHub Dorks","pathname":"/dorks/github-dorks","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Dorks","emoji":"1f575-2642"}]},{"id":"cEHgDv7NGBquDGHeLyQ4","title":"Top Hacking Books for 2024: FREE and Paid","pathname":"/resources/editor","siteSpaceId":"sitesp_16SC1","description":"Boost your cybersecurity skills with VeryLazyTech’s self-study resources—learn the lazy way!","breadcrumbs":[{"label":"📚 Resources"}]},{"id":"ZXxfwYY21Yz9PCv9X7ja","title":"How to Study for OSCP with the PWK Book PDF","pathname":"/resources/markdown","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"📚 Resources"}]},{"id":"bSpIfb9AfVBlyBzhk8QU","title":"Top 20 phishing tools to use in 2024","pathname":"/resources/top-20-phishing-tools-to-use-in-2024","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"📚 Resources"}]},{"id":"Jcdc6Xi6Aowy63LbnNP1","title":"Top 8 Bug Bounty Books for 2025: Must-Reads for Ethical Hackers","pathname":"/resources/top-8-bug-bounty-books-for-2025-must-reads-for-ethical-hackers","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"📚 Resources"}]},{"id":"beIDDoUT5ehMC8eQdBtY","title":"Top Hacking Tools and Skills You Need to Learn in 2025","pathname":"/resources/top-hacking-tools-and-skills-you-need-to-learn-in-2025","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"📚 Resources"}]},{"id":"Is0XyJgK2PqA3hDLIfkH","title":"Penetration Testing & Hacking Tools List","pathname":"/resources/penetration-testing-and-hacking-tools-list","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"📚 Resources"}]},{"id":"PZg4VCuozikqd1F15bvZ","title":"Top Cybersecurity Books by Topic","pathname":"/resources/top-cybersecurity-books-by-topic","siteSpaceId":"sitesp_16SC1","description":"Looking for the best cybersecurity books? This list covers ethical hacking, OSINT, red teaming, malware analysis, and more—organized by topic for easy access.","breadcrumbs":[{"label":"📚 Resources"}]},{"id":"xNlCIjRQj1qkAdQOKSUy","title":"The Ultimate Penetration Testing Methodology (2025 Edition)","pathname":"/resources/the-ultimate-penetration-testing-methodology-2025-edition","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"📚 Resources"}]},{"id":"McpUU1u0ADAmmtyyPcCY","title":"Client Side Template Injection (CSTI)","pathname":"/pentesting-web/client-side-template-injection-csti","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"9PcaCjusHecS0Su7Xqn4","title":"Identify a Server’s Origin IP","pathname":"/pentesting-web/identify-a-servers-origin-ip","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"2q4wKqsa47Vm3LXNCOHp","title":"2FA/MFA/OTP Bypass","pathname":"/pentesting-web/2fa-mfa-otp-bypass","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"I9ukpt7UJNpd3hCPe9oM","title":"IDOR","pathname":"/pentesting-web/idor","siteSpaceId":"sitesp_16SC1","description":"Learn to uncover more IDORs the lazy way with VeryLazyTech—tips, tricks, and hacks revealed!","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"4leI54iKwPuG9VvkHzYy","title":"Open Redirect","pathname":"/pentesting-web/open-redirect","siteSpaceId":"sitesp_16SC1","description":"Open Redirect (also known as Unvalidated Redirects and Forwards) occurs when a web application accepts user-supplied input and redirects the user to an arbitrary URL without proper validation.","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"IV31efvYgDGmN3VVf3aQ","title":"Subdomain Takeover","pathname":"/pentesting-web/subdomain-takeover","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"oJ6f29qBtwB2HGXAhAdU","title":"CMS Wp/Durpal/Joomla/etc..","pathname":"/pentesting-web/cms-wp-durpal-joomla-etc..","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"kGqSWahCDln90FKIifuK","title":"Penetration Testing WiFi Networks","pathname":"/pentesting-web/penetration-testing-wifi-networks","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"dNUSSNLISvbfTLKOHaGc","title":"Client-Side Path Traversal","pathname":"/pentesting-web/client-side-path-traversal","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"4oSEzk32Tig2c2Y6ZQMV","title":"Clickjacking","pathname":"/pentesting-web/clickjacking","siteSpaceId":"sitesp_16SC1","description":"Explore clickjacking attacks with VeryLazyTech—techniques, exploits, and lazy prevention tips!","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"crabQJeDEzETJMwYQ0SU","title":"Command Injection","pathname":"/pentesting-web/command-injection","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"dk1i1LzAx5fDWNgxE4Xs","title":"JWT Vulnerabilities","pathname":"/pentesting-web/jwt-vulnerabilities","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"X91JpPHOZJDsA7odpWmu","title":"Bypass rating limit","pathname":"/pentesting-web/bypass-rating-limit","siteSpaceId":"sitesp_16SC1","description":"Bypass rate limits like a pro with VeryLazyTech—advanced exploits and lazy techniques unveiled!","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"NCX0603NRAGgjD1zoobr","title":"CORS - Misconfigurations & Bypass","pathname":"/pentesting-web/cors-misconfigurations-and-bypass","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"mPZZZYlTE02dSWYKUHVd","title":"LDAP Injection","pathname":"/pentesting-web/ldap-injection","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"NBDb6kK2hOwb3P94gkd7","title":"File upload vulnerabilities","pathname":"/pentesting-web/file-upload-vulnerabilities","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"nP6zUB3uJFQW32hKTfhi","title":"Content Security Policy (CSP) bypass","pathname":"/pentesting-web/content-security-policy-csp-bypass","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"rCTa9afMq4x8wREHs12j","title":"Brute Force - Services, web, local, tools & wordlists","pathname":"/pentesting-web/brute-force-services-web-local-tools-and-wordlists","siteSpaceId":"sitesp_16SC1","description":"A comprehensive brute force guide covering web logins, APIs, and local services like IMAP, MySQL, and LDAP using tools like Hydra, Medusa, Legba, and more.","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"LyXNCipZDXXRJbRqMR3Q","title":"Shellshock","pathname":"/pentesting-web/shellshock","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Pentesting Web","emoji":"1f578"}]},{"id":"GCIg5LyyVNhXtkuDcb1F","title":"Practical Linux Commands","pathname":"/linux/practical-linux-commands","siteSpaceId":"sitesp_16SC1","description":"","breadcrumbs":[{"label":"Linux","emoji":"1f427"}]},{"id":"yoVyqcZZsmhUswZCpeNe","title":"Bypassing Bash Restrictions - Rbash","pathname":"/linux/bypassing-bash-restrictions-rbash","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Linux","emoji":"1f427"}]},{"id":"hekrV3Av5mq7272JJzDG","title":"Privilege escalation - Linux","pathname":"/linux/privilege-escalation-linux","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Linux","emoji":"1f427"}]},{"id":"8rqguVi702hLPKyJXkgn","title":"Linux Environment Variables","pathname":"/linux-environment-variables","siteSpaceId":"sitesp_16SC1"},{"id":"QwHFLVleY7QejI9V4gc3","title":"Active Directory Methodology","pathname":"/windows/images-and-media","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Windows","emoji":"1fa9f"}]},{"id":"YXw4FGwOVZFWaAvP6VGS","title":"Antivirus (AV) Bypass","pathname":"/windows/antivirus-av-bypass","siteSpaceId":"sitesp_16SC1","description":"In this guide, we provide a deep dive into Windows Antivirus (AV) and Endpoint Detection and Response (EDR) bypass techniques, empowering red teamers and advanced penetration testers with up-to-date,","breadcrumbs":[{"label":"Windows","emoji":"1fa9f"}]},{"id":"z5omcJcVfYZt13MTRdor","title":"Practical Windows Commands","pathname":"/windows/practical-windows-commands","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Windows","emoji":"1fa9f"}]},{"id":"joAI9dEA6ADEhFTRYKHk","title":"100+ Windows CMD Commands","pathname":"/windows/100+-windows-cmd-commands","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Windows","emoji":"1fa9f"}]},{"id":"DdrESKTXVxqaNz1FItey","title":"FTP - Port 21","pathname":"/network-pentesting/ftp-port-21","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Network Pentesting","emoji":"1f310"}]},{"id":"533dFzdGPc54DWArUdtY","title":"SSH- Port 22","pathname":"/network-pentesting/ssh-port-22","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Network Pentesting","emoji":"1f310"}]},{"id":"w45ppcnYER3hwhqdyoHo","title":"Telnet - Port 23","pathname":"/network-pentesting/telnet-port-23","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Network Pentesting","emoji":"1f310"}]},{"id":"McDdfGplD34cko1uNwhb","title":"SMTP/s - Port 25,465,587","pathname":"/network-pentesting/smtp-s-port-25-465-587","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Network Pentesting","emoji":"1f310"}]},{"id":"tTQ45Q8iWZFpSgS9SPxP","title":"WHOIS - Port 43","pathname":"/network-pentesting/whois-port-43","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Network Pentesting","emoji":"1f310"}]},{"id":"SGRs74YARnFzHuumNLRz","title":"TACACS+ - Port 49","pathname":"/network-pentesting/tacacs+-port-49","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Network Pentesting","emoji":"1f310"}]},{"id":"JEbEfwriaAh4f5Ve14Ke","title":"DNS - Port 53","pathname":"/network-pentesting/dns-port-53","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Network Pentesting","emoji":"1f310"}]},{"id":"7DsSeCWFbzNTjYg0QyPh","title":"TFTP/Bittorrent-tracker - Port 69/UDP","pathname":"/network-pentesting/tftp-bittorrent-tracker-port-69-udp","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Network Pentesting","emoji":"1f310"}]},{"id":"RWW0VWO7hAyc4P1kG5eL","title":"Finger - Port 79","pathname":"/network-pentesting/finger-port-79","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Network Pentesting","emoji":"1f310"}]},{"id":"7WFeQTHkPjeLJQCoeOYm","title":"Web - Port 80,443","pathname":"/network-pentesting/web-port-80-443","siteSpaceId":"sitesp_16SC1","description":"Ports 80 and 443 are the primary ports for web traffic, with port 80 handling unencrypted HTTP traffic and port 443 managing encrypted HTTPS traffic.","breadcrumbs":[{"label":"Network Pentesting","emoji":"1f310"}]},{"id":"iLMnRvrWCK5tbIwjyLgC","title":"Kerberos - Port 88","pathname":"/network-pentesting/kerberos-port-88","siteSpaceId":"sitesp_16SC1","description":"Master pentesting Kerberos on port 88 with VeryLazyTech’s lazy methodology—exploits included!","breadcrumbs":[{"label":"Network Pentesting","emoji":"1f310"}]},{"id":"7jGAqw5mVQiW7LiuTxq6","title":"POP - Port 110/995","pathname":"/network-pentesting/pop-port-110-995","siteSpaceId":"sitesp_16SC1","description":"","breadcrumbs":[{"label":"Network Pentesting","emoji":"1f310"}]},{"id":"aBSQCg8PAdKywRITMHaI","title":"Portmapper - Port 111/TCP/UDP","pathname":"/network-pentesting/portmapper-port-111-tcp-udp","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Network Pentesting","emoji":"1f310"}]},{"id":"Yn5FqUVWvQcgSwI8dBN6","title":"Ident - Port 113","pathname":"/network-pentesting/ident-port-113","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Network Pentesting","emoji":"1f310"}]},{"id":"C1SXAvJMu25kZn1j6dUb","title":"NTP - Port 123/UDP","pathname":"/network-pentesting/ntp-port-123-udp","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Network Pentesting","emoji":"1f310"}]},{"id":"JPykGoMdpYVwlwhai3Lj","title":"MSRPC - Port 135, 539","pathname":"/network-pentesting/msrpc-port-135-539","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Network Pentesting","emoji":"1f310"}]},{"id":"3H1ZL6n7wdhLqunUanJ2","title":"NetBios - Port 137,138,139","pathname":"/network-pentesting/netbios-port-137-138-139","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Network Pentesting","emoji":"1f310"}]},{"id":"LbSk1v3EDfeOkW6rpA4o","title":"SMB - Port 139 445","pathname":"/network-pentesting/smb-port-139-445","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Network Pentesting","emoji":"1f310"}]},{"id":"jJLI00hoqwr49IAUVZcE","title":"IMAP - Port 143, 993","pathname":"/network-pentesting/imap-port-143-993","siteSpaceId":"sitesp_16SC1","description":"","breadcrumbs":[{"label":"Network Pentesting","emoji":"1f310"}]},{"id":"mrB8aA5QUbofdLZKQjrf","title":"SNMP - Ports  161, 162, 10161, and 10162/UDP","pathname":"/network-pentesting/snmp-ports-161-162-10161-and-10162-udp","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Network Pentesting","emoji":"1f310"}]},{"id":"pTEnFxqUUADEmGAWN7rz","title":"IRC - Ports 194,6667,6660-7000","pathname":"/network-pentesting/irc-ports-194-6667-6660-7000","siteSpaceId":"sitesp_16SC1","description":"IRC, initially a plain text protocol, was assigned 194/TCP by IANA but is commonly run on 6667/TCP and similar ports to avoid needing root privileges for operation.","breadcrumbs":[{"label":"Network Pentesting","emoji":"1f310"}]},{"id":"7ioL0mVf5u3l3880woap","title":"Check Point Firewall - Port 264","pathname":"/network-pentesting/check-point-firewall-port-264","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Network Pentesting","emoji":"1f310"}]},{"id":"Bu0xXkoNAOeckrBBEick","title":"LDAP - Ports 389, 636, 3268, 3269","pathname":"/network-pentesting/ldap-ports-389-636-3268-3269","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Network Pentesting","emoji":"1f310"}]},{"id":"rq5xxlEnjCA2YQ7mjq7k","title":"IPsec/IKE VPN - Port 500/UDP","pathname":"/network-pentesting/ipsec-ike-vpn-port-500-udp","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Network Pentesting","emoji":"1f310"}]},{"id":"lQ8hsWA1rIYH8bXGACaW","title":"Modbus - Port 502","pathname":"/network-pentesting/modbus-port-502","siteSpaceId":"sitesp_16SC1","description":"Modbus is a communication protocol used in industrial automation to allow devices like programmable logic controllers (PLCs) to talk to each other.","breadcrumbs":[{"label":"Network Pentesting","emoji":"1f310"}]},{"id":"8qux5YcGPhQBF4RgP9Jn","title":"Rexec - Port 512","pathname":"/network-pentesting/rexec-port-512","siteSpaceId":"sitesp_16SC1","description":"It is a service that allows you to execute a command inside a host if you know valid credentials (username and password).","breadcrumbs":[{"label":"Network Pentesting","emoji":"1f310"}]},{"id":"LzJU1mvHCEpk80PhKlRC","title":"Rlogin - Port 513","pathname":"/network-pentesting/rlogin-port-513","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Network Pentesting","emoji":"1f310"}]},{"id":"hdCVzD0noK6DSHLQ6jHP","title":"Rsh - Port 514","pathname":"/network-pentesting/rsh-port-514","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Network Pentesting","emoji":"1f310"}]},{"id":"sPdv8Zn3DB9CyPxJDVKZ","title":"Line Printer Daemon (LPD) - Port 515","pathname":"/network-pentesting/line-printer-daemon-lpd-port-515","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Network Pentesting","emoji":"1f310"}]},{"id":"BrB9lOkkkeyUvOTpI5yO","title":"Apple Filing Protocol (AFP) - PORT 548","pathname":"/network-pentesting/apple-filing-protocol-afp-port-548","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Network Pentesting","emoji":"1f310"}]},{"id":"CXRHYd1rESc23jGaZzwi","title":"RTSP - Port 554, 8554","pathname":"/network-pentesting/rtsp-port-554-8554","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Network Pentesting","emoji":"1f310"}]},{"id":"foKBjo5wcQjLLuGJv1Z6","title":"IPMI - Port 623/UDP/TCP","pathname":"/network-pentesting/ipmi-port-623-udp-tcp","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Network Pentesting","emoji":"1f310"}]},{"id":"WNTXq9YgdxV0KiyIEPmk","title":"Internet Printing Protocol (IPP) - Port 631","pathname":"/network-pentesting/internet-printing-protocol-ipp-port-631","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Network Pentesting","emoji":"1f310"}]},{"id":"sla6u8IU5BAQhYHKcJU0","title":"EPP - Port 700","pathname":"/network-pentesting/epp-port-700","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Network Pentesting","emoji":"1f310"}]},{"id":"BgwYAyeqZsiW2abkJUPC","title":"Rsync - Port 873","pathname":"/network-pentesting/rsync-port-873","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Network Pentesting","emoji":"1f310"}]},{"id":"nwWmpIPnw2kv3SqB2dJi","title":"Rusersd Service - Port 1026","pathname":"/network-pentesting/rusersd-service-port-1026","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Network Pentesting","emoji":"1f310"}]},{"id":"yH0YlEGZwj3nAt12GbBK","title":"Socks - Port 1080","pathname":"/network-pentesting/socks-port-1080","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Network Pentesting","emoji":"1f310"}]},{"id":"rMznrOPz33bMV8PRAKv7","title":"Java RMI - RMI-IIOP - Port 1098/1099/1050","pathname":"/network-pentesting/java-rmi-rmi-iiop-port-1098-1099-1050","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Network Pentesting","emoji":"1f310"}]},{"id":"C2w0yTpnrPPvG86SEgaV","title":"MSSQL  (Microsoft SQL Server) - Port 1433","pathname":"/network-pentesting/mssql-microsoft-sql-server-port-1433","siteSpaceId":"sitesp_16SC1","description":"Master pentesting MSSQL on port 1433 with VeryLazyTech’s guide—exploits, tips, and more!","breadcrumbs":[{"label":"Network Pentesting","emoji":"1f310"}]},{"id":"DZotyBFznUw0Z4UTBkYh","title":"Oracle TNS Listener - Port 1521,1522-1529","pathname":"/network-pentesting/oracle-tns-listener-port-1521-1522-1529","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Network Pentesting","emoji":"1f310"}]},{"id":"M2xNx4JrFBJdO4ipjDWs","title":"PPTP - Port 1723","pathname":"/pptp-port-1723","siteSpaceId":"sitesp_16SC1"},{"id":"k398kltWaq4PCH690l5O","title":"MQTT (Message Queuing Telemetry Transport) - Port 1883","pathname":"/mqtt-message-queuing-telemetry-transport-port-1883","siteSpaceId":"sitesp_16SC1"},{"id":"IrP8KC3xqjZzmfy2ip0u","title":"Compaq HP Insight Manager - Port 2301, 2381","pathname":"/compaq-hp-insight-manager-port-2301-2381","siteSpaceId":"sitesp_16SC1"},{"id":"vXG65ORM1r0waBtbVLex","title":"NFS Service - Port 2049","pathname":"/nfs-service-port-2049","siteSpaceId":"sitesp_16SC1"},{"id":"d1HEojdK6KRfdmv6InMn","title":"Docker - Port 2375,2376","pathname":"/docker-port-2375-2376","siteSpaceId":"sitesp_16SC1"},{"id":"OmwcRwtt7mZefhnIVPWB","title":"Squid - Port 3128","pathname":"/squid-port-3128","siteSpaceId":"sitesp_16SC1"},{"id":"cZiygKy7IGGTl0BtVRbd","title":"iScsi - Port 3260","pathname":"/iscsi-port-3260","siteSpaceId":"sitesp_16SC1"},{"id":"FevoC0I8DsQ3xOpszV3m","title":"SAPRouter - Port 3299","pathname":"/saprouter-port-3299","siteSpaceId":"sitesp_16SC1"},{"id":"FkB8PQEiC7gRdU5jTCVB","title":"MySql - Port 3306","pathname":"/mysql-port-3306","siteSpaceId":"sitesp_16SC1"},{"id":"GtA3GBK9k8tZJRgqIvfY","title":"RDP - PORT 3389","pathname":"/rdp-port-3389","siteSpaceId":"sitesp_16SC1"},{"id":"kGL1Aa74hq3wyOhPnp5p","title":"Distcc - Port 3632","pathname":"/distcc-port-3632","siteSpaceId":"sitesp_16SC1"},{"id":"IORTS1PSd8YcRiJPr6hz","title":"Subversion (SVN) Server -Port 3690","pathname":"/subversion-svn-server-port-3690","siteSpaceId":"sitesp_16SC1"},{"id":"2GEHXbvPaoBPiqqo6i1E","title":"WS-Discovery - Port 3702/UDP","pathname":"/ws-discovery-port-3702-udp","siteSpaceId":"sitesp_16SC1"},{"id":"g8Kwk8yEG17serK7HA4c","title":"Erlang Port Mapper Daemon - PORT 4369","pathname":"/erlang-port-mapper-daemon-port-4369","siteSpaceId":"sitesp_16SC1"},{"id":"sUo7iIpmUk2lImtX8mRl","title":"Cisco Smart Install - PORT 4786","pathname":"/cisco-smart-install-port-4786","siteSpaceId":"sitesp_16SC1"},{"id":"qe8MqmhgZLIXY5Y793Km","title":"OPC UA - PORT 4840","pathname":"/opc-ua-port-4840","siteSpaceId":"sitesp_16SC1"},{"id":"S3LF4OzIY73IYAh0Ihj5","title":"Docker Registry - PORT 5000","pathname":"/docker-registry-port-5000","siteSpaceId":"sitesp_16SC1"},{"id":"iKG2MEPVU0keCDZKkqHe","title":"Multicast DNS (mDNS) and DNS-SD - PORT 5353/UDP","pathname":"/multicast-dns-mdns-and-dns-sd-port-5353-udp","siteSpaceId":"sitesp_16SC1"},{"id":"7RXoHhvjDthKT0z2occE","title":"Postgresql - PORT 5432,5433","pathname":"/postgresql-port-5432-5433","siteSpaceId":"sitesp_16SC1"},{"id":"LtUB6BXUDWzQdc3C37EJ","title":"Android Debug Bridge (ADB) - PORT 5555","pathname":"/android-debug-bridge-adb-port-5555","siteSpaceId":"sitesp_16SC1"},{"id":"9KHdKCtZv8QDtj50tNeo","title":"Kibana - Port 5601","pathname":"/kibana-port-5601","siteSpaceId":"sitesp_16SC1"},{"id":"KiwIlaST7AYkBmNSnY90","title":"AMQP (RabbitMQ) - Port 5671/5672","pathname":"/amqp-rabbitmq-port-5671-5672","siteSpaceId":"sitesp_16SC1"},{"id":"OSjQ2VcuHXcJteRjaNWh","title":"VNC - Port 5800/5801/5900/5901","pathname":"/vnc-port-5800-5801-5900-5901","siteSpaceId":"sitesp_16SC1"},{"id":"SkBb56c1RZD9GB0TXV0n","title":"CouchDB - Port 5984,6984","pathname":"/couchdb-port-5984-6984","siteSpaceId":"sitesp_16SC1"},{"id":"bvY4VPGZiNyEbYWxunjQ","title":"WinRM - Port 5985, 5986","pathname":"/winrm-port-5985-5986","siteSpaceId":"sitesp_16SC1"},{"id":"3VNsEWkV8oChk8UhJWOm","title":"X11 - Port 6000","pathname":"/x11-port-6000","siteSpaceId":"sitesp_16SC1"},{"id":"U4iPf8XEYOFPSKMzDNxy","title":"Redis - Port 6379","pathname":"/redis-port-6379","siteSpaceId":"sitesp_16SC1"},{"id":"WOqlASp8V2POWYvpYMYP","title":"Apache Jserv Protocol (AJP) - Port 8009","pathname":"/apache-jserv-protocol-ajp-port-8009","siteSpaceId":"sitesp_16SC1"},{"id":"uDPaOhXAwUscLF0PUipd","title":"InfluxDB - Port 8086","pathname":"/influxdb-port-8086","siteSpaceId":"sitesp_16SC1"},{"id":"VSsWREwmZDRSbe5blItc","title":"Splunkd - Port 8089","pathname":"/splunkd-port-8089","siteSpaceId":"sitesp_16SC1"},{"id":"B0AVnWsI1WUkjWYjxA3P","title":"Bitcoin - Port 8333, 18333, 38333, 18444","pathname":"/bitcoin-port-8333-18333-38333-18444","siteSpaceId":"sitesp_16SC1"},{"id":"MVfRZdCV8grlyvYsRfHo","title":"FastCGI - Port 9000","pathname":"/fastcgi-port-9000","siteSpaceId":"sitesp_16SC1"},{"id":"pgdwHnPPH9qDqg69bntz","title":"HSQLDB - Port 9001","pathname":"/hsqldb-port-9001","siteSpaceId":"sitesp_16SC1"},{"id":"T6gwLDtQdDjCwJel8HVJ","title":"Cassandra - Port 9042, 9160","pathname":"/cassandra-port-9042-9160","siteSpaceId":"sitesp_16SC1"},{"id":"iD5TAiqc6B83ReruEzUz","title":"PJL (Printer Job Language) - Port 9100","pathname":"/pjl-printer-job-language-port-9100","siteSpaceId":"sitesp_16SC1"},{"id":"4TlnNpiOLXSNDTo04ZGg","title":"Elasticsearch - Port 9200","pathname":"/elasticsearch-port-9200","siteSpaceId":"sitesp_16SC1"},{"id":"GkYl13xbWrwFSwZYXxdA","title":"Network Data Management Protocol (NDMP) - PORT 10000","pathname":"/network-data-management-protocol-ndmp-port-10000","siteSpaceId":"sitesp_16SC1"},{"id":"H2Vawo7WgwXQW2pxM3B0","title":"Memcache - Port 11211","pathname":"/memcache-port-11211","siteSpaceId":"sitesp_16SC1"},{"id":"BPgAzpHhg7vhkGnaH5Uv","title":"RabbitMQ Management - Port 15672","pathname":"/rabbitmq-management-port-15672","siteSpaceId":"sitesp_16SC1"},{"id":"6F6caDWNCuzu56rndgkt","title":"GlusterFS - Port 24007, 24008, 24009, 49152","pathname":"/glusterfs-port-24007-24008-24009-49152","siteSpaceId":"sitesp_16SC1"},{"id":"178cF3UsormOukayksgr","title":"MongoDB - Port 27017, 27018","pathname":"/mongodb-port-27017-27018","siteSpaceId":"sitesp_16SC1"},{"id":"tOYdoFNvsGPU0awgsgXU","title":"PPPP (CS2) P2P Cameras - Port 32100 UDP","pathname":"/pppp-cs2-p2p-cameras-port-32100-udp","siteSpaceId":"sitesp_16SC1"},{"id":"Ciw7SFxS8oC14RH7hm24","title":"Tiller / Helm - Port 44134","pathname":"/tiller-helm-port-44134","siteSpaceId":"sitesp_16SC1"},{"id":"UrcxTZ6B3IT9nXq5oNNb","title":"EtherNet/IP - Port 44818","pathname":"/ethernet-ip-port-44818","siteSpaceId":"sitesp_16SC1"},{"id":"DbQDP62qW1g23nG13yGz","title":"File Transfer Cheatsheet: Windows and Linux","pathname":"/post-exploitation/file-transfer-cheatsheet-windows-and-linux","siteSpaceId":"sitesp_16SC1","description":"File transfer is a critical component in post-exploitation, penetration testing, and red teaming.","breadcrumbs":[{"label":"Post-exploitation","emoji":"1f60e"}]},{"id":"IXpNp8Zbrpd3XbzT79Fv","title":"Kali Linux - Installation","pathname":"/technical-guides/kali-linux-installation","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Technical guides","emoji":"1f9d1-1f527"}]},{"id":"CULNTBXKVNPV9OXmrgbC","title":"Search Exploits","pathname":"/technical-guides/search-exploits","siteSpaceId":"sitesp_16SC1","description":"Stop Wasting Time! The Secret Method to Find Exploits in Minutes","breadcrumbs":[{"label":"Technical guides","emoji":"1f9d1-1f527"}]},{"id":"9GemJaHTyM5bvBS7rOwc","title":"Pivoting & Tunneling","pathname":"/technical-guides/pivoting-and-tunneling","siteSpaceId":"sitesp_16SC1","breadcrumbs":[{"label":"Technical guides","emoji":"1f9d1-1f527"}]}]}