Understanding Group Policy order

You should always ask yourself two questions when dealing with Group Policy: Where are you (local, site, domain, or organizational unit)? What are you (computer or user)? The LSD OU rule With these two questions, you will be able to understand how the system applies Group Policy Objects as well …

Read More »

Post Exploitation Hacking Techniques

we’ll talk about post exploitation hacking techniques you can use after having a meterpreter shell on a remote system. You’ll see things like: Privilege Escalation Maintaining Access Data Harvesting Weak Password Cracking NOTE: Don’t take this guide as standard methodology. The purpose is to show different “tips and tricks” you …

Read More »

exploit windows PC using eternalblue smb remote windows kernel pool corruption

This module is a port of the Equation Group ETERNALBLUE exploit, part of the FuzzBunch toolkit released by Shadow Brokers. There is a buffer overflow memmove operation in Srv! SrvOs2FeaToNt. The size is calculated in Srv!SrvOs2FeaListSizeToNt, with mathematical error where a DWORD is subtracted into a WORD. The kernel pool …

Read More »

HOWTO:change root password in Persistence Kali

Well, i just trying to do something to protect my persistence login and i found the way to do it, ex: 1. make your login with root using toor pw 2. open this file with any text editor like nano “/lib/live/config/0031-root-password” , just comment this line with put # at …

Read More »

HOWTO: Repair a broken Ext4 Superblock in Ubuntu

This has happened to me a few times, and it’s not a nice problem to find yourself in. You computer won’t boot, all your filesystem checks tell you you’ve a bad superblock, but you cant seem to find how to fix it. Well, here goes 🙂 This guide is for …

Read More »

What’s New in Windows Server 2016

The content in this section describes what’s new and changed in Windows Server® 2016. The new features and changes listed here are the ones most likely to have the greatest impact as you work with this release. There are several new additions in each of these areas: Compute, Identity, Management …

Read More »

PwnPi & Kali Installation Guide

Penetration Testing Distributions for Raspberry Pi PwnPi is a penetration testing distribution for the Raspberry Pi, this guide will explain how to install it for your Raspberry Pi. The best way to describe it can be found on the PwnPi website[1]: “PwnPi is a Linux-based penetration testing dropbox distribution for …

Read More »

Quick and easy fake WiFi access point in Kali

I’m working on a project at the moment that requires me to observe traffic from an iOS/Android app or any other computer Apps to various external IPs. This is the first step of my project 😉 (something in this article is not real , like MAC addresses, project Description , …

Read More »

بهترین کتابهای Hacking سال 2016 (دانلود)

The below hacking books in pdf format which you can easily read in any PDF reader. By reading these hacking tutorial pdf  you can learn some basic and advanced tricks and hack of Wifi, pen testing, some how to hack,cracking password,WiFi hacks and website hacking etc. These books are both for beginners …

Read More »

آشنایی با شبکه Frame Relay

تکنولوژی Frame Relayیک تکنولوژی لایه 2 شبکه های WANمی باشد که فرآیند Encapsulateکردن بسته های IPو ارسال آنها در شبکه را انجام میدهد و در دسته بندی NBMAیا NoneBroadcast Multi Accessقرار می گیرد. در شبکه Frame Relayارتباط روترها به صورت DTEو DCEمی باشند و به لینک ارتباط دهنده Access Linkگفته …

Read More »