Network Security - Network Segmentation and Micro-Segmentation

Explore the power of network segmentation and micro-segmentation in enhancing network security. Learn about the benefits, implementation strategies, and how they align with the Zero Trust model. 🛡️

May 17, 2024 · 10 min · UncleSp1d3r

Network Protocol Analysis - Wireshark and tcpdump

Explore network protocol analysis using Wireshark & tcpdump for packet capture, filtering, dissection, and real-world pen testing scenarios.

June 9, 2023 · 9 min · UncleSp1d3r

Network Scanning and Enumeration - Tools and techniques

This article explores the importance of network scanning and enumeration in penetration testing, offering real-world examples and tools commonly used by red teamers.

March 6, 2023 · 12 min · UncleSp1d3r

Using xfreerdp and Pass-the-Hash for RDP Connection

This article explores how to use xfreerdp and Pass-the-Hash technique to connect to an RDP server and provides practical examples, usage guidance, and known limitations.

February 16, 2023 · 4 min · UncleSp1d3r

Tunneling Traffic through a Network: Techniques for Combining Iptables Port Redirection, SSH Tunnels, and Netsh Port Proxies

This article explains how to tunnel traffic through a network using iptables port redirection, SSH tunnels, and netsh port proxies.

February 15, 2023 · 9 min · UncleSp1d3r

Efficient Remote File Transfers: Using SCP and SSH with a Master Control Socket

In this article, we explored how to use SCP and SSH with a master control socket to streamline remote file transfers, improve efficiency, and maintain security for red teaming and penetration testing operations.

February 9, 2023 · 13 min · UncleSp1d3r

Port Scanning on Linux and Windows

This article explains how to perform port scanning on Linux and Windows using built-in tools and commonly available utilities.

February 5, 2023 · 7 min · UncleSp1d3r