All Writeups
The 4 way handshake Router sends a challenge: The router (or access point) sends a challenge” to […]
Using Metasploit to create a document with malicious macros Launch Metasploit use exploit/multi/fileformat/office_word_macro set payload windows/meterpreter/reverse_tcp […]
First cat out the proxychains file cat /etc/proxychains4.conf at the bottom look for socks4 127.0.0.1 9050 […]
The set user ID (SETUID or SUID) tells linux the executable files that are set to […]
This is the process I use to see which extensions may be blocked for upload forms. […]
This is a technique that can be used to retrieve any Google Chrome stored passwords The […]
A zone transfer is a transaction that is intended to be used to replicate DNS databases […]
Mimikatz is a very popular and powerful post-exploitation tool most commonly used for dumping user credentials […]
Mimikatz is a very popular and powerful post-exploitation tool mainly used for dumping user credentials inside […]
Embedding Malware in PDFs Launch Metasploit search adobe_pdf set options set Payload set INFILENAME /root/Deskstop/syllabus.pdf set […]