Introduction to Penetration Testing - Basic concepts and methodology
This article provides a beginner-friendly introduction to penetration testing, covering core concepts, methodologies, essential tools, and practical examples.
This article provides a beginner-friendly introduction to penetration testing, covering core concepts, methodologies, essential tools, and practical examples.
This article explores how macOS differs from Linux under the hood, focusing on critical differences in the Unix layer that affect red teamers transitioning from Linux.
This article explores what PsExec is, how it works, and how red teamers or pen testers can use it to achieve remote code execution on a target system, including detailed examples and prerequisites.
A practical red team guide to remote code execution using sc.exe on Windows—covering payload creation, encoding, service configuration, and execution.
Comprehensive guide to Chisel: traffic tunneling via SSH over HTTP, with installation, use cases, and advanced tips for overcoming network restrictions.
This article explores how to use xfreerdp and Pass-the-Hash technique to connect to an RDP server and provides practical examples, usage guidance, and known limitations.
This article explains how to tunnel traffic through a network using iptables port redirection, SSH tunnels, and netsh port proxies.
This article explains how to use Impacket example scripts to access Microsoft SQL Server from Linux.
Discover smbclient’s basics, obscure flags, and practical uses in red teaming and pen testing in this introductory article.
Dive into Ruby programming basics and its use in pen testing and red teaming, alongside a comparison of its merits and drawbacks in cybersecurity.