Introduction to Penetration Testing - Basic concepts and methodology
This article provides a basic introduction to penetration testing, including its basic concepts, methodology, tools used, and examples.
This article provides a basic introduction to penetration testing, including its basic concepts, methodology, tools used, and examples.
This article explores the differences between macOS’s Unix underpinnings and Linux, focusing on how these differences affect Red Team members who are familiar with Linux.
This article explores what PsExec is, how it works, and how red teamers or pen testers can use it to achieve remote code execution on a target system, with examples and prerequisites.
Detailed guide for advanced red teams on using sc.exe for remote execution on Windows, including payload creation, encoding, and service initiation.
Discover microcode’s importance in pen testing, its history, operation, and examples of microcode attacks, with resources for further study.
Explore how Red Team members use DSQuery to gather info on Active Directory environments, including specific examples and considerations.
Dive into advanced use cases for powerful Windows command-line tools like PowerShell, Netsh, and more, targeted at Red Team members.
Step-by-step guide to transfer data from MySQL to a local system using Docker, mysqldump, and pgloader, with prerequisites included.
Comprehensive guide to Chisel: traffic tunneling via SSH over HTTP, with installation, use cases, and advanced tips for overcoming network restrictions.
This article explores how to use xfreerdp and Pass-the-Hash technique to connect to an RDP server and provides real-world examples and limitations.