Techniques

First cat out the proxychains file cat /etc/proxychains4.conf at the bottom look […]
The set user ID (SETUID or SUID) tells linux the executable files […]
This is the process I use to see which extensions may be […]
This is a technique that can be used to retrieve any Google […]
A zone transfer is a transaction that is intended to be used […]
Mimikatz is a very popular and powerful post-exploitation tool most commonly used […]
Mimikatz is a very popular and powerful post-exploitation tool mainly used for […]
Embedding Malware in PDFs Launch Metasploit search adobe_pdf set options set Payload […]
Creating custom payloads can be useful as detection tools can recognize security […]
*After obtaining Admin access* The tool of choice is built into Windows.  […]
python -c “import pty; pty.spawn(‘/bin/bash’)” Running this command should allow you to […]
Python Web server can come in handy when pentesting. It can be […]
Background the session that is open run the command search shell_to_meterpreter use 0 […]