Powershell is POWERED SHELL for Sysadmins and Penetration testers

This article contains a list of PowerShell commands collected from various corners of the Internet which could be helpful during penetration tests or red team exercises. The list includes various post-exploitation one-liners in pure PowerShell without requiring any offensive (= potentially flagged as malicious) 3rd party modules, but also a …

Read More »

Adding Trusted Root Certificate to the Servers

If you want to send or receive messages signed by root authorities and these authorities are not installed on the server, you must add a trusted root certificate manually. Use the following steps to add or remove trusted root certificates to/from a server. Mac OS X FunctionMethodAddUse command: sudo security …

Read More »

Digital Forensics and Incident Response

IntroductionDisclaimerArtifact locationsGet an object of forensic artifactsQuery object for relevant registry keys:Query object for relevant file paths:Windows Cheat SheetOrder of VolatilityMemory Files (Locked by OS during use)Binalyze IREC Evidence Collector (GUI or CommandLine)Belkasoft Live RAM CapturerRedlineMemoryzeComae DumpITMagnet Forensics (Mostly GUI)Volexity SurgeMicrosoft LiveKdWinpmemImaging Live MachinesFTK Imager (Cmd version, mostly GUI for …

Read More »

Hosting and hiding your C2 with Docker and Socat

Abstract We want to run a simple C2 that is not exposed to the internet, with multiple socats redirecting our payload delivery and session handling correctly. All this with the help of Docker. It’s straightforward once you’ve gotten the grip. Why Using containers means we get the “it always works” …

Read More »

How to Install NodeJS on Kali Linux

# Verify that you have all required tools sudo apt-get install python g++ make checkinstall fakeroot # Create tmp dir and switch to it src=$(mktemp -d) && cd $src # Download the latest version of Node wget -N http://nodejs.org/dist/node-latest.tar.gz # Extract the content of the tar file tar xzvf node-latest.tar.gz …

Read More »

RFSec-ToolKit V1.7

RFSec-ToolKit is a collection of Radio Frequency Communication Protocol Hacktools which are from the github platform,and Hacking Tutorial from youtube、blog post, including SDR、2G GSM、3G 、4G LTE 、5G、NFC&RFID、ZigBee and so on. SDR Resources SDR-HardWare to be used RTL2832U:RTL-SDR is a very cheap software defined radio that uses a DVB-T TV tuner …

Read More »

Post Exploitation Hacking Techniques

we’ll talk about post exploitation hacking techniques you can use after having a meterpreter shell on a remote system. You’ll see things like: Privilege Escalation Maintaining Access Data Harvesting Weak Password Cracking NOTE: Don’t take this guide as standard methodology. The purpose is to show different “tips and tricks” you …

Read More »

exploit windows PC using eternalblue smb remote windows kernel pool corruption

This module is a port of the Equation Group ETERNALBLUE exploit, part of the FuzzBunch toolkit released by Shadow Brokers. There is a buffer overflow memmove operation in Srv! SrvOs2FeaToNt. The size is calculated in Srv!SrvOs2FeaListSizeToNt, with mathematical error where a DWORD is subtracted into a WORD. The kernel pool …

Read More »

HOWTO:change root password in Persistence Kali

Well, i just trying to do something to protect my persistence login and i found the way to do it, ex: 1. make your login with root using toor pw 2. open this file with any text editor like nano “/lib/live/config/0031-root-password” , just comment this line with put # at …

Read More »

HOWTO: Repair a broken Ext4 Superblock in Ubuntu

This has happened to me a few times, and it’s not a nice problem to find yourself in. You computer won’t boot, all your filesystem checks tell you you’ve a bad superblock, but you cant seem to find how to fix it. Well, here goes 🙂 This guide is for …

Read More »