Top Categories


todayJanuary 10, 2021

Web Applications Penetration Testing Mahmoud Gamal

Weblogic Remote Code Execution (Exploiting CVE-2019-2725)

TL;DR In this article I will explain several techniques that I used to exploit CVE-2019-2725. About Weblogic Oracle WebLogic Server is a Java EE application server currently developed by Oracle Corporation. Oracle acquired WebLogic Server when it purchased BEA Systems in 2008. Wikipedia CVE-2019-2725 On April 25, 2019, a team [...]

Top Voted
Sorry, there is nothing for the moment.

Digital Forensics

1 Result / Page 1 of 1


Digital Forensics Kareem Ali / October 1, 2020

Event Log service – Between Offensive and defensive

Event Log Service Event viewer is the preinstalled application in windows to view windows logs, it depends on a event log service to function   EventLog Service Service configuration: STOPPABLE, AcceptPause, AcceptStop Binary path : svchost.exe -k LocalServiceNetworkRestricted -p -k LocalServiceNetworkRestricted is responsible for running eventlog service plus many other ...


Cyber Castle is an Egyptian cyber security company founded in 2020. specializes in the cyber security services & solutions with the aim to detect, protect and mitigate from sophisticated cyber threats in a timely manner.

Where We Are

92 Omar Ibn El-Khattab, Almazah, Heliopolis, Cairo Governorate


Mobile: (02) 01018233755


Follow us