Pentest One Liners

A list of one line commands for Windows to download and execute payloads.

Credential Interception Using Malicious SMB Shares

How to intercept NTLM-SSP hashed credentials for offline cracking.

Casino Royale CTF

A walkthrough for VulnHub’s Casino Royale CTF.

Software Restriction Policies

Configuring Software Restriction Policies (SRP) in Windows 10.

GoldenEye CTF

A writeup of the VulnHub GoldenEye capture the flag (CTF) challenge.

Extracting Windows Credentials Using Native Tools

How to extract credentials from Windows systems using built in commands.

Kerberoasting

Kerbroasting to extract service account credentials.

Lateral Movement With Named Pipes

A demonstraton of named pipe communication using Meterpreter.

Session Enumeration With NetSessionEnum API

How to take advantage of the NetSessionEnum API to determine remotely logged in users.

BloodHound

Using BloodHound to exploit Active Directory based networks.

Active Directory Honey Tokens

Configuring Active Directory honey tokens to detect account enumeration.

Creating a WPA2 Enterprise Access Point

A guide to configure a Linux system as a WPA2 Enterprise wireless access point using an Alpha wireless adapter.