Adding Trusted Root Certificate to the Servers

If you want to send or receive messages signed by root authorities and these authorities are not installed on the server, you must add a trusted root certificate manually. Use the following steps to add or remove trusted root certificates to/from a server. Mac OS X FunctionMethodAddUse command: sudo security …

Read More »

Digital Forensics and Incident Response

IntroductionDisclaimerArtifact locationsGet an object of forensic artifactsQuery object for relevant registry keys:Query object for relevant file paths:Windows Cheat SheetOrder of VolatilityMemory Files (Locked by OS during use)Binalyze IREC Evidence Collector (GUI or CommandLine)Belkasoft Live RAM CapturerRedlineMemoryzeComae DumpITMagnet Forensics (Mostly GUI)Volexity SurgeMicrosoft LiveKdWinpmemImaging Live MachinesFTK Imager (Cmd version, mostly GUI for …

Read More »

Hosting and hiding your C2 with Docker and Socat

Abstract We want to run a simple C2 that is not exposed to the internet, with multiple socats redirecting our payload delivery and session handling correctly. All this with the help of Docker. It’s straightforward once you’ve gotten the grip. Why Using containers means we get the “it always works” …

Read More »

How to Install NodeJS on Kali Linux

# Verify that you have all required tools sudo apt-get install python g++ make checkinstall fakeroot # Create tmp dir and switch to it src=$(mktemp -d) && cd $src # Download the latest version of Node wget -N http://nodejs.org/dist/node-latest.tar.gz # Extract the content of the tar file tar xzvf node-latest.tar.gz …

Read More »

RFSec-ToolKit V1.7

RFSec-ToolKit is a collection of Radio Frequency Communication Protocol Hacktools which are from the github platform,and Hacking Tutorial from youtube、blog post, including SDR、2G GSM、3G 、4G LTE 、5G、NFC&RFID、ZigBee and so on. SDR Resources SDR-HardWare to be used RTL2832U:RTL-SDR is a very cheap software defined radio that uses a DVB-T TV tuner …

Read More »

Post Exploitation Hacking Techniques

we’ll talk about post exploitation hacking techniques you can use after having a meterpreter shell on a remote system. You’ll see things like: Privilege Escalation Maintaining Access Data Harvesting Weak Password Cracking NOTE: Don’t take this guide as standard methodology. The purpose is to show different “tips and tricks” you …

Read More »

exploit windows PC using eternalblue smb remote windows kernel pool corruption

This module is a port of the Equation Group ETERNALBLUE exploit, part of the FuzzBunch toolkit released by Shadow Brokers. There is a buffer overflow memmove operation in Srv! SrvOs2FeaToNt. The size is calculated in Srv!SrvOs2FeaListSizeToNt, with mathematical error where a DWORD is subtracted into a WORD. The kernel pool …

Read More »

HOWTO:change root password in Persistence Kali

Well, i just trying to do something to protect my persistence login and i found the way to do it, ex: 1. make your login with root using toor pw 2. open this file with any text editor like nano “/lib/live/config/0031-root-password” , just comment this line with put # at …

Read More »

HOWTO: Repair a broken Ext4 Superblock in Ubuntu

This has happened to me a few times, and it’s not a nice problem to find yourself in. You computer won’t boot, all your filesystem checks tell you you’ve a bad superblock, but you cant seem to find how to fix it. Well, here goes 🙂 This guide is for …

Read More »

What’s New in Windows Server 2016

The content in this section describes what’s new and changed in Windows Server® 2016. The new features and changes listed here are the ones most likely to have the greatest impact as you work with this release. There are several new additions in each of these areas: Compute, Identity, Management …

Read More »