Techniques

Background the session that is open run the command search shell_to_meterpreter use 0 […]
Python Web server can come in handy when pentesting. It can be […]
Upgrading to TTY shell python -c ‘import pty; pty.spawn(“/bin/sh”)’ echo os.system(‘/bin/bash’) /bin/sh […]
*After obtaining Admin access* The tool of choice is built into Windows.  […]
Creating custom payloads can be useful as detection tools can recognize security […]
Embedding Malware in PDFs Launch Metasploit search adobe_pdf set options set Payload […]
Mimikatz is a very popular and powerful post-exploitation tool mainly used for […]
Mimikatz is a very popular and powerful post-exploitation tool most commonly used […]
A zone transfer is a transaction that is intended to be used […]
This is a technique that can be used to retrieve any Google […]
This is the process I use to see which extensions may be […]
The set user ID (SETUID or SUID) tells linux the executable files […]
First cat out the proxychains file cat /etc/proxychains4.conf at the bottom look […]