Open in app

Sign In

Write

Sign In

Inveteck Global
Inveteck Global

12 Followers

Home

About

Sep 6, 2021

Exploiting ActiveMQ 5.11.1/5.13.2 under 5 minutes with 5 steps (Directory Traversal / RCE)

Today we are going to exploit an activeMQ running on port 8161 without Metasploit. Apache ActiveMQ is an open source message broker written in Java together with a full Java Message Service client. …

Cybersecurity

2 min read

Exploiting ActiveMQ 5.11.1/5.13.2 under 5 minutes with 5 steps (Directory Traversal / RCE)
Exploiting ActiveMQ 5.11.1/5.13.2 under 5 minutes with 5 steps (Directory Traversal / RCE)
Cybersecurity

2 min read


Jul 26, 2021

Cyber Security and Technology: The New Wealth of Africa

The attainment of wealth is what drives economy and individual prosperity. Wealth is not the same as being rich. Wealth is sustainable, recurring and generational. Riches propel you to wealth. For you can find a diamond mine for riches, but your descendants having generational financial security is wealth. Africa is…

2 min read

2 min read


Jan 27, 2021

Practical Demo of the Unconstrained Delegation Attack

There has been many publications out there explaining various ways to attack an unconstrained delegation. This research/post is to practically show how such misconfiguration can be exploited easily and effectively. To further understand this kind of attack, check out the resources at the bottom below. Let’s get started: To perform…

Red Team

4 min read

Practical Demo of the Unconstrained Delegation Attack
Practical Demo of the Unconstrained Delegation Attack
Red Team

4 min read

Inveteck Global

Inveteck Global

12 Followers

Ghana’s #1 practical cyber security company https://inveteckglobal.com

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams