Tunneling Traffic through a Network: Techniques for Combining Iptables Port Bends, SSH Tunnels, and Netsh Port Proxies
This article explains how to tunnel traffic through a network using iptables port bends, SSH tunnels, and netsh port proxies.
This article explains how to tunnel traffic through a network using iptables port bends, SSH tunnels, and netsh port proxies.
This article explains how to use Impacket example scripts to access Microsoft SQL Server from Linux.
This article explains how to use Impacket example scripts to access Windows shares from Linux.
Discover smbclient’s basics, obscure flags, and practical uses in red teaming and pen testing in this introductory article.
In this article, we explored how to use SCP and SSH with a master control socket to streamline remote file transfers, improve efficiency, and maintain security for red teaming and penetration testing operations.
Dive into Ruby programming basics and its use in pen testing and red teaming, alongside a comparison of its merits and drawbacks in cybersecurity.
This article explains how Red Team members can disable command history in various Linux shells to maintain operational security.
This article explores how Red Team members can utilize alternate data streams on Windows NTFS to hide data, with specific examples and cautionary considerations.
This article explains how to perform port scanning on Linux and Windows using only built-in tools.
Explore this guide on installing and using Impacket, a Python network protocols library, emphasizing its role in penetration testing with real-world examples.