Abstract We want to run a simple C2 that is not exposed to the internet, with multiple socats redirecting our payload delivery and session handling correctly. All this with the help of Docker. It’s straightforward once you’ve gotten the grip. Why Using containers means we get the “it always works” …
Read More »How to Install NodeJS on Kali Linux
# Verify that you have all required tools sudo apt-get install python g++ make checkinstall fakeroot # Create tmp dir and switch to it src=$(mktemp -d) && cd $src # Download the latest version of Node wget -N http://nodejs.org/dist/node-latest.tar.gz # Extract the content of the tar file tar xzvf node-latest.tar.gz …
Read More »RFSec-ToolKit V1.7
RFSec-ToolKit is a collection of Radio Frequency Communication Protocol Hacktools which are from the github platform,and Hacking Tutorial from youtube、blog post, including SDR、2G GSM、3G 、4G LTE 、5G、NFC&RFID、ZigBee and so on. SDR Resources SDR-HardWare to be used RTL2832U:RTL-SDR is a very cheap software defined radio that uses a DVB-T TV tuner …
Read More »Understanding Group Policy order
You should always ask yourself two questions when dealing with Group Policy: Where are you (local, site, domain, or organizational unit)? What are you (computer or user)? The LSD OU rule With these two questions, you will be able to understand how the system applies Group Policy Objects as well …
Read More »Post Exploitation Hacking Techniques
we’ll talk about post exploitation hacking techniques you can use after having a meterpreter shell on a remote system. You’ll see things like: Privilege Escalation Maintaining Access Data Harvesting Weak Password Cracking NOTE: Don’t take this guide as standard methodology. The purpose is to show different “tips and tricks” you …
Read More »exploit windows PC using eternalblue smb remote windows kernel pool corruption
This module is a port of the Equation Group ETERNALBLUE exploit, part of the FuzzBunch toolkit released by Shadow Brokers. There is a buffer overflow memmove operation in Srv! SrvOs2FeaToNt. The size is calculated in Srv!SrvOs2FeaListSizeToNt, with mathematical error where a DWORD is subtracted into a WORD. The kernel pool …
Read More »HOWTO:change root password in Persistence Kali
Well, i just trying to do something to protect my persistence login and i found the way to do it, ex: 1. make your login with root using toor pw 2. open this file with any text editor like nano “/lib/live/config/0031-root-password” , just comment this line with put # at …
Read More »HOWTO: Repair a broken Ext4 Superblock in Ubuntu
This has happened to me a few times, and it’s not a nice problem to find yourself in. You computer won’t boot, all your filesystem checks tell you you’ve a bad superblock, but you cant seem to find how to fix it. Well, here goes 🙂 This guide is for …
Read More »What’s New in Windows Server 2016
The content in this section describes what’s new and changed in Windows Server® 2016. The new features and changes listed here are the ones most likely to have the greatest impact as you work with this release. There are several new additions in each of these areas: Compute, Identity, Management …
Read More »PwnPi & Kali Installation Guide
Penetration Testing Distributions for Raspberry Pi PwnPi is a penetration testing distribution for the Raspberry Pi, this guide will explain how to install it for your Raspberry Pi. The best way to describe it can be found on the PwnPi website[1]: “PwnPi is a Linux-based penetration testing dropbox distribution for …
Read More »