Understanding macOS's Unix Underpinnings for Linux Red Team Members
This article explores how macOS differs from Linux under the hood, focusing on critical differences in the Unix layer that affect red teamers transitioning from Linux.
This article explores how macOS differs from Linux under the hood, focusing on critical differences in the Unix layer that affect red teamers transitioning from Linux.
This article explores what PsExec is, how it works, and how red teamers or pen testers can use it to achieve remote code execution on a target system, including detailed examples and prerequisites.
A practical red team guide to remote code execution using sc.exe on Windows—covering payload creation, encoding, service configuration, and execution.
Comprehensive guide to Chisel: traffic tunneling via SSH over HTTP, with installation, use cases, and advanced tips for overcoming network restrictions.
This article explores how to use xfreerdp and Pass-the-Hash technique to connect to an RDP server and provides practical examples, usage guidance, and known limitations.
This article explains how to tunnel traffic through a network using iptables port redirection, SSH tunnels, and netsh port proxies.
This article explains how to use Impacket example scripts to access Microsoft SQL Server from Linux.
Discover smbclient’s basics, obscure flags, and practical uses in red teaming and pen testing in this introductory article.
Dive into Ruby programming basics and its use in pen testing and red teaming, alongside a comparison of its merits and drawbacks in cybersecurity.
This article explains how to perform port scanning on Linux and Windows using built-in tools and commonly available utilities.