Understanding macOS's Unix Underpinnings for Linux Red Team Members
This article explores how macOS differs from Linux under the hood, focusing on critical differences in the Unix layer that affect red teamers transitioning from Linux.
This article explores how macOS differs from Linux under the hood, focusing on critical differences in the Unix layer that affect red teamers transitioning from Linux.
This article explores what PsExec is, how it works, and how red teamers or pen testers can use it to achieve remote code execution on a target system, including detailed examples and prerequisites.
A practical red team guide to remote code execution using sc.exe on Windows—covering payload creation, encoding, service configuration, and execution.
Discover how microcode functions beneath the operating system, its significance in offensive security, historical context, and real-world attack examples.
Learn how red teamers can leverage DSQuery to enumerate Active Directory environments, with detailed command examples and practical considerations.
Explore advanced use cases for powerful Windows command-line tools like PowerShell, Netsh, WMIC, and more—tailored for experienced red teamers.
A step-by-step guide to transferring data from MySQL to PostgreSQL using Docker, mysqldump, and pgloader, including prerequisites and a full walkthrough.
Comprehensive guide to Chisel: traffic tunneling via SSH over HTTP, with installation, use cases, and advanced tips for overcoming network restrictions.
This article explores how to use xfreerdp and Pass-the-Hash technique to connect to an RDP server and provides practical examples, usage guidance, and known limitations.
This article explains how to tunnel traffic through a network using iptables port redirection, SSH tunnels, and netsh port proxies.