A regular domain user can easily take over the entire Active Directory domain. While we still recommend that the print spooler service should be disabled on any system that does not need it, we also want to provide a temporary workaround to make the exploit ineffective, while allowing you to …
Read More »Dumping RDP Credentials
Administrators typically use Remote Desktop Protocol (RDP) in order to manage Windows environments remotely. It is also typical RDP to be enabled in systems that act as a jumpstation to enable users to reach other networks. However even though this protocol is widely used most of the times it is …
Read More »Deep-dive into Windows Active Directory for Penetesters !
Why this post? The purpose of this guide is to view Active Directory from an attacker perspective. I will try to review different aspects of Active Directory and those terms that every pentester should control in order to understand the attacks that can be performed in a Active Directory network. …
Read More »Active Directory Exploitation [EVERYTHING]
Summary Active Directory Exploitation Cheatsheet Summary Tools Domain Enumeration Using PowerView Using AD Module Using BloodHound Useful Enumeration Tools Local Privilege Escalation Lateral Movement Powershell Remoting Remote Code Execution with PS Credentials Import a powershell module and execute its functions remotely Executing Remote Stateful commands Mimikatz Useful Tools Domain Privilege …
Read More »Powershell is POWERED SHELL for Sysadmins and Penetration testers
This article contains a list of PowerShell commands collected from various corners of the Internet which could be helpful during penetration tests or red team exercises. The list includes various post-exploitation one-liners in pure PowerShell without requiring any offensive (= potentially flagged as malicious) 3rd party modules, but also a …
Read More »Adding Trusted Root Certificate to the Servers
If you want to send or receive messages signed by root authorities and these authorities are not installed on the server, you must add a trusted root certificate manually. Use the following steps to add or remove trusted root certificates to/from a server. Mac OS X FunctionMethodAddUse command: sudo security …
Read More »Digital Forensics and Incident Response
IntroductionDisclaimerArtifact locationsGet an object of forensic artifactsQuery object for relevant registry keys:Query object for relevant file paths:Windows Cheat SheetOrder of VolatilityMemory Files (Locked by OS during use)Binalyze IREC Evidence Collector (GUI or CommandLine)Belkasoft Live RAM CapturerRedlineMemoryzeComae DumpITMagnet Forensics (Mostly GUI)Volexity SurgeMicrosoft LiveKdWinpmemImaging Live MachinesFTK Imager (Cmd version, mostly GUI for …
Read More »Hosting and hiding your C2 with Docker and Socat
Abstract We want to run a simple C2 that is not exposed to the internet, with multiple socats redirecting our payload delivery and session handling correctly. All this with the help of Docker. It’s straightforward once you’ve gotten the grip. Why Using containers means we get the “it always works” …
Read More »How to Install NodeJS on Kali Linux
# Verify that you have all required tools sudo apt-get install python g++ make checkinstall fakeroot # Create tmp dir and switch to it src=$(mktemp -d) && cd $src # Download the latest version of Node wget -N http://nodejs.org/dist/node-latest.tar.gz # Extract the content of the tar file tar xzvf node-latest.tar.gz …
Read More »RFSec-ToolKit V1.7
RFSec-ToolKit is a collection of Radio Frequency Communication Protocol Hacktools which are from the github platform,and Hacking Tutorial from youtube、blog post, including SDR、2G GSM、3G 、4G LTE 、5G、NFC&RFID、ZigBee and so on. SDR Resources SDR-HardWare to be used RTL2832U:RTL-SDR is a very cheap software defined radio that uses a DVB-T TV tuner …
Read More »