Techniques
Background the session that is open run the command search shell_to_meterpreter use 0 […]
Upgrading to TTY shell python -c ‘import pty; pty.spawn(“/bin/sh”)’ echo os.system(‘/bin/bash’) /bin/sh […]
*After obtaining Admin access* The tool of choice is built into Windows. […]
Creating custom payloads can be useful as detection tools can recognize security […]
Embedding Malware in PDFs Launch Metasploit search adobe_pdf set options set Payload […]
Mimikatz is a very popular and powerful post-exploitation tool mainly used for […]
Mimikatz is a very popular and powerful post-exploitation tool most commonly used […]
This is a technique that can be used to retrieve any Google […]
This is the process I use to see which extensions may be […]
First cat out the proxychains file cat /etc/proxychains4.conf at the bottom look […]
Using Metasploit to create a document with malicious macros Launch Metasploit use […]
The 4 way handshake Router sends a challenge: The router (or access point) […]