Tunneling Traffic through a Network: Techniques for Combining Iptables Port Redirection, SSH Tunnels, and Netsh Port Proxies

This article explains how to tunnel traffic through a network using iptables port redirection, SSH tunnels, and netsh port proxies.

February 15, 2023 · 7 min · UncleSp1d3r

How to Use Impacket Example Scripts to Access Microsoft SQL Server from Linux

This article explains how to use Impacket example scripts to access Microsoft SQL Server from Linux.

February 14, 2023 · 2 min · UncleSp1d3r

Using Impacket to Access Windows Shares from Linux

This article explains how to use Impacket example scripts to access Windows shares from Linux.

February 12, 2023 · 3 min · UncleSp1d3r

Basic Introduction to smbclient

Discover smbclient’s basics, obscure flags, and practical uses in red teaming and pen testing in this introductory article.

February 10, 2023 · 8 min · UncleSp1d3r

Ruby Programming Language - Basic concepts and coding practices

Dive into Ruby programming basics and its use in pen testing and red teaming, alongside a comparison of its merits and drawbacks in cybersecurity.

February 9, 2023 · 10 min · UncleSp1d3r

SSH Multiplexing and Master Control Sockets: Advanced Techniques for Red Team Operations

This article explores SSH multiplexing and master control sockets, powerful techniques that allow multiple SSH sessions to share a single connection. We cover the fundamentals of SSH protocol architecture, practical implementation for file transfers, SOCKS proxying, port forwarding, and security considerations for red teaming operations.

February 9, 2023 · 14 min · UncleSp1d3r

Disabling Command History in Linux Shells for Red Team Operations

This article explains how Red Team members can disable command history in various Linux shells to maintain operational security.

February 8, 2023 · 6 min · UncleSp1d3r

Alternate Data Streams on Windows NTFS: A Red Team's Guide to Hiding and Detecting Hidden Data

This article explores how Red Team members can utilize alternate data streams on Windows NTFS to hide data, with specific examples and cautionary considerations.

February 7, 2023 · 4 min · UncleSp1d3r

Port Scanning on Linux and Windows

This article explains how to perform port scanning on Linux and Windows using built-in tools and commonly available utilities.

February 5, 2023 · 7 min · UncleSp1d3r

How to Install Impacket

Explore this guide on installing and using Impacket, a Python network protocols library, emphasizing its role in penetration testing with real-world examples.

February 4, 2023 · 6 min · UncleSp1d3r