Skip to main content

Linux

Where's My Prompt? Penetration testing without a TTY

··1477 words·7 mins· loading · loading
Improve post-exploitation workflows by upgrading a non-interactive shell to a full TTY, enhancing control over a compromised system.

History - Computing in the 1990s: The Emergence of Linux and Open-Source Software

··3881 words·19 mins· loading · loading
The article explores the history of open-source software and its impact on the computing industry, from the rise of Microsoft and proprietary software to the birth of Linux and the GNU Project, the emergence of open-source software, and the mainstreaming of open-source software, highlighting key players, developments, and anecdotes, while also discussing its relevance to cybersecurity and the need for community-driven development and collaboration.

Mythic: An Introduction to the Open Source Post-Exploitation Framework

··1525 words·8 mins· loading · loading
Mythic is a powerful, open-source post-exploitation framework that offers red teamers and pen testers an extensible and customizable platform with numerous modules, agents, and C2 profiles to enhance their engagements and achieve objectives in various target environments.

The Darwinian Transition: A Linux Red Team Operator's Guide to macOS

··1026 words·5 mins· loading · loading
A deep-dive guide for red team operators transitioning from Linux to macOS. Learn the critical differences in Unix underpinnings, master macOS-specific security boundaries like TCC and SIP, discover “Living off the Land” techniques using JXA and AppleScript, and understand how to persist using LaunchDaemons.

Data exfiltration - Migrating MySQL to PostgreSQL with Docker and pgloader

··853 words·5 mins· loading · loading
A specialized guide for Red Team operators on exfiltrating and migrating data from a target MySQL database to a local PostgreSQL instance. Learn how to use Docker for rapid infrastructure deployment, pgloader for automated schema conversion, and handle both live network migrations and offline dump analysis.

The Ghost in the Machine: Using xfreerdp and Pass-the-Hash for RDP

··969 words·5 mins· loading · loading
A deep-dive into the technical requirements and execution of Pass-the-Hash for Remote Desktop Protocol (RDP). Learn the correct xfreerdp syntax, how to enable Restricted Admin Mode remotely, troubleshoot NLA errors, and understand the forensic “Type 3” logon anomaly.

Mastering the Maze: Advanced Tunneling and Port Redirection for Red Team Operators

··1212 words·6 mins· loading · loading
A deep-dive guide into advanced network tunneling techniques. Learn to combine Iptables, SSH (Local, Remote, Dynamic, and Reverse Dynamic), Windows Netsh, and Socat to bypass firewalls, pivot through sophisticated network segments, and maintain a low profile during engagements. Now covers modern tools like Chisel and Ligolo-ng.

Master the Database - Exploiting Microsoft SQL Server with Impacket

··1136 words·6 mins· loading · loading
A comprehensive guide for red team operators on using Impacket’s mssqlclient.py to discover, authenticate, and exploit Microsoft SQL Server instances. Learn to achieve RCE via xp_cmdshell and OLE Automation, steal hashes via UNC path coercion (xp_dirtree), abuse linked servers, and extract sensitive data stealthily.

Master SMB Operations - Using Impacket to Conquer Windows Shares

··1301 words·7 mins· loading · loading
A massive, comprehensive deep-dive into leveraging Impacket’s powerful SMB tools for offensive operations. Learn how to access shares using smbclient.py, host malicious shares with smbserver.py, perform high-impact NTLM relaying, dump domain secrets with secretsdump.py, and troubleshoot protocol hurdles.

Disable Shell History Safely - Advanced OPSEC for Linux Operations

··1536 words·8 mins· loading · loading
Master the art of flight without leaving a footprint. A comprehensive guide to disabling shell history, managing operational hygiene, and understanding the forensic limit of these techniques across Bash, Zsh, Fish, and PowerShell on Linux.

Port Scanning on Linux and Windows - The Ultimate Guide

··1232 words·6 mins· loading · loading
A comprehensive guide to mastering port scanning on both Linux and Windows, covering standard tools like Nmap, stealthy built-in techniques, and modern PowerShell-based enumeration.