PowerSploit: Using PowerShell for Offensive Security Operations

PowerSploit, a collection of PowerShell modules designed for offensive security operations, offers powerful tools for code execution, script modification, persistence, privilege escalation, recon, and exfiltration, enabling penetration testers and red teamers to enhance their skills and stay ahead in the cybersecurity landscape.

March 18, 2023 · 4 min · UncleSp1d3r

Metasploit Framework: An Overview of the Open Source Penetration Testing Tool

A detailed overview of the Metasploit Framework, covering its history, components, module types, and real-world use cases to help red teamers and penetration testers use it more effectively.

March 11, 2023 · 8 min · UncleSp1d3r

PsExec for Remote Code Execution

This article explores what PsExec is, how it works, and how red teamers or pen testers can use it to achieve remote code execution on a target system, including detailed examples and prerequisites.

February 25, 2023 · 6 min · UncleSp1d3r

Remote Execution with sc.exe on Windows: A Red Team Guide

A practical red team guide to remote code execution using sc.exe on Windows—covering payload creation, encoding, service configuration, and execution.

February 24, 2023 · 6 min · UncleSp1d3r

Using WMIC for Red Teaming: A Practical Guide for Offensive Security

A hands-on guide for red teamers and pen testers on using the Windows Management Instrumentation Command-line (WMIC) for system enumeration, remote command execution, and more.

February 23, 2023 · 8 min · UncleSp1d3r

Chisel - Tunneling Traffic with SSH over HTTP

Comprehensive guide to Chisel: traffic tunneling via SSH over HTTP, with installation, use cases, and advanced tips for overcoming network restrictions.

February 17, 2023 · 5 min · UncleSp1d3r

Using xfreerdp and Pass-the-Hash for RDP Connection

This article explores how to use xfreerdp and Pass-the-Hash technique to connect to an RDP server and provides practical examples, usage guidance, and known limitations.

February 16, 2023 · 5 min · UncleSp1d3r

Tunneling Traffic through a Network: Techniques for Combining Iptables Port Redirection, SSH Tunnels, and Netsh Port Proxies

This article explains how to tunnel traffic through a network using iptables port redirection, SSH tunnels, and netsh port proxies.

February 15, 2023 · 7 min · UncleSp1d3r

How to Use Impacket Example Scripts to Access Microsoft SQL Server from Linux

This article explains how to use Impacket example scripts to access Microsoft SQL Server from Linux.

February 14, 2023 · 2 min · UncleSp1d3r

Using Impacket to Access Windows Shares from Linux

This article explains how to use Impacket example scripts to access Windows shares from Linux.

February 12, 2023 · 3 min · UncleSp1d3r