Browse Skills

Performing Windows Artifact Analysis With Eric Zimmerman Tools

v1.0.0

Perform comprehensive Windows forensic artifact analysis using Eric Zimmerman's open-source EZ Tools suite including KAPE, MFTECmd, PECmd, LECmd, JLECmd, and Timeline Explorer for parsing registry hives, prefetch files, event logs, and file system metadata.

mukul975
3

Performing Wifi Password Cracking With Aircrack

v1.0.0

>

mukul975
4

Performing Web Cache Poisoning Attack

v1.0.0

Exploiting web cache mechanisms to serve malicious content to other users by poisoning cached responses through unkeyed headers and parameters during authorized security tests.

mukul975
2

Performing Web Cache Deception Attack

v1.0.0

Execute web cache deception attacks by exploiting path normalization discrepancies between CDN caching layers and origin servers to cache and retrieve sensitive authenticated content.

mukul975
5

Performing Web Application Vulnerability Triage

v1.0.0

Triage web application vulnerability findings from DAST/SAST scanners using OWASP risk rating methodology to separate true positives from false positives and prioritize remediation.

mukul975
4

Performing Web Application Scanning With Nikto

v1.0.0

Nikto is an open-source web server and web application scanner that tests against over 7,000 potentially dangerous files/programs, checks for outdated versions of over 1,250 servers, and identifies ve

mukul975
4

Performing Web Application Penetration Test

v1.0.0

>

mukul975
3

Performing Web Application Firewall Bypass

v1.0.0

Bypass Web Application Firewall protections using encoding techniques, HTTP method manipulation, parameter pollution, and payload obfuscation to deliver SQL injection, XSS, and other attack payloads past WAF detection rules.

mukul975
6

Performing Vulnerability Scanning With Nessus

v1.0.0

>

mukul975
3

Performing Vlan Hopping Attack

v1.0.0

>

mukul975
2

Performing User Behavior Analytics

v1.0.0

>

mukul975
6

Performing Timeline Reconstruction With Plaso

v1.0.0

Build comprehensive forensic super-timelines using Plaso (log2timeline) to correlate events across file systems, logs, and artifacts into a unified chronological view.

mukul975
3