All Writeups

This lab is from the CyberOps Cisco training. its intent is to fire off a macro […]
Havoc Client sudo apt update (If client is on separate host) git clone https://github.com/HavocFramework/Havoc.git sudo apt […]
Install gr33n37-ip-changer – https://github.com/gr33n37/gr33n37-ip-changer “`git clone https://github.com/gr33n37/gr33n37-ip-changer.git“` “`cd gr33n37-ip-changer“ Install Tor “`sudo apt install tor“` Usage […]
Create a text file with extension types .php .php3 .php4 .php5 .phtml Launch Burp Enable intercept […]
The 4 way handshake Router sends a challenge: The router (or access point) sends a challenge” to […]
Using Metasploit to create a document with malicious macros Launch Metasploit use exploit/multi/fileformat/office_word_macro set payload  windows/meterpreter/reverse_tcp […]
Jeeves is not overly complicated, however it focuses on some interesting techniques and provides a great […]
Cap is an easy difficulty Linux machine running an HTTP server that performs administrative functions including […]
SecNotes is a medium difficulty machine, which highlights the risks associated with weak password change mechanisms, […]