All Writeups
First cat out the proxychains file cat /etc/proxychains4.conf at the bottom look for socks4 127.0.0.1 9050 […]
The set user ID (SETUID or SUID) tells linux the executable files that are set to […]
This is the process I use to see which extensions may be blocked for upload forms. […]
This is a technique that can be used to retrieve any Google Chrome stored passwords The […]
A zone transfer is a transaction that is intended to be used to replicate DNS databases […]
Mimikatz is a very popular and powerful post-exploitation tool most commonly used for dumping user credentials […]
Mimikatz is a very popular and powerful post-exploitation tool mainly used for dumping user credentials inside […]
Embedding Malware in PDFs Launch Metasploit search adobe_pdf set options set Payload set INFILENAME /root/Deskstop/syllabus.pdf set […]
Creating custom payloads can be useful as detection tools can recognize security systems. OpenSource/Free tools Veil […]
*After obtaining Admin access* The tool of choice is built into Windows. It is an active […]