Skip to main content

Recently Updated Pages

Misc

Certifications CREST

Encryption/Hashing Block Ciphers ECB - Electronic Code Block CBC - Cipher Block Chaining OF...

Updated 1 month ago by Vlad Birgauanu

ICMP Responses

Certifications CREST

The below is not an extensive list. The rest of the responses are either deprecated or experime...

Updated 1 month ago by Vlad Birgauanu

Command Examples

Certifications CREST

POP POP protocol is session based. Changes occur only after you type QUIT. USER [username] # t...

Updated 1 month ago by Vlad Birgauanu

rlogin

Certifications CREST

Opens ports between 512-514 Service Port Protocol rcp 514 TCP rexec ...

Updated 1 month ago by Vlad Birgauanu

Common Ports

Certifications CREST

Port Service 7 ECHO 9 Discard 13 Daytime 17 QotD (Quote of the...

Updated 1 month ago by Vlad Birgauanu

TTL

Certifications CREST

The operating system sets the initial TTL value or application creating the IP packet. Here are s...

Updated 1 month ago by Vlad Birgauanu

Blast Defender

Hacking Advanced Methodology

Via command prompt cmd.exe /c "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" -removedefinit...

Updated 1 month ago by Vlad Birgauanu

Linux AD

Hacking Advanced Methodology

Tools required <https://github.com/its-a-feature/KeytabParser> <https://github.com/sosdave/KeyT...

Updated 1 month ago by Vlad Birgauanu

6. Pivot

Hacking Advanced Methodology

You can use the standard apt repos if you don’t need to do any modifications, e.g. bypassing Ap...

Updated 1 month ago by Vlad Birgauanu

5. Persistence

Hacking Advanced Methodology

Linux - SSH On your host cat ~/.ssh/id_rsa.pub # if you don't have one create run: ssh-key -t r...

Updated 1 month ago by Vlad Birgauanu

4. Post Compromise

Hacking Advanced Methodology

Blast AV and enable RDP with hashes cmd.exe /c "C:\\Program Files\\Windows Defender\\MpCmdRu...

Updated 1 month ago by Vlad Birgauanu

3. Privilege Escalation - Windows

Hacking Advanced Methodology

PowerUp Upload the following script to the host /usr/share/windows-resources/powersploit/Pri...

Updated 1 month ago by Vlad Birgauanu

Phishing

Hacking Advanced Methodology

HTA payloads Ping <html> <head> <script language="JScript"> var shell = new ActiveXObject(...

Updated 1 month ago by Vlad Birgauanu

2. Initial Access

Hacking Advanced Methodology

Updated 1 month ago by Vlad Birgauanu

1. Enumeration

Hacking Advanced Methodology

Automated approach autorecon TARGET_IP Manual approach nmap TARGET_IP -p- --min-rate 1400 -sV ...

Updated 1 month ago by Vlad Birgauanu

Quick Checklist

Hacking Cheatsheets

Personal Checklist [ ] Enumeration [ ] nmap [ ] autorecon [ ] HTTP/S? [ ] gobuster/d...

Updated 1 month ago by Vlad Birgauanu

ligolo-ng

Hacking Tools

You can use the standard apt repos if you don’t need to do any modifications, e.g. bypassing Appl...

Updated 1 month ago by Vlad Birgauanu

mimikatz

Hacking Tools

You will need to first upload the binaries to the target, either via a meterpreter shell or power...

Updated 1 month ago by Vlad Birgauanu

powersploit

Hacking Tools

Reset a user’s password $UserPassword = ConvertTo-SecureString 'Password123!' -AsPlainText -Forc...

Updated 1 month ago by Vlad Birgauanu

rubeus

Hacking Tools

Rubeus.exe asktgt /user:username /rc4:NTLM_hash /ptt

Updated 1 month ago by Vlad Birgauanu