45.6 F
High Point

SSH Tunneling

SSH Tunneling When you need to access a server/client behind a firewall that doesn't allow port forwarding you can use SSH tunneling to bypass that if an SSH server is running. Pivoting is a sneaky technique that hackers use to access computers, servers, and services behind firewalls. These examples will use OpenSSH. I think...
Must Haves for the IT Professionals Over the years I've used some really cool devices and services and I find these all to be very useful tools that I personally must own. DeepCool So, I was a hacker party once and my friend was like, "You have...
Post Exploitation Recon I frequently experience dead-ends on the more difficult CTF boxes. I've found that once acquiring a reverse shell I need to do some extensive internal recon. Sometimes the service that will be vulnerable is hidden and you must find it. Here are some ideas...
Enumerating Samba/SMB Servers Unintentionally leaving port 445 open or misconfiguring Samba can risk catastrophic damage to a corporation. Enumerating the Samba/SMB port can return critical information about file shares, users, printers and network groups. This can be a cornerstone for brute forcing accounts and accessing unprotected Samba shares. enum4linux
PowerShell for Hackers As I'm learning more PowerShell and dabbling into hacking I will be composing a list of techniques and scripts that I find very beneficial for administration and pen-testing. Basics System Running Processes
Parrot OS 4.7 Full-Screen Issue This is a quick easy fix. By default, it appears that Parrot OS 4.7 virtual appliance (.ova) doesn't come with VirtualBox Guest Additions installed. Once you have booted up Parrot OS run this command to install the VirtualBox Guest Utilities. Once this is installed, you may reboot and everything...
Changing the DNS Server on your ISP's Router One of the ways your ISP is spying on you is through monitoring your DNS requests. Each time you visit a website the TCP/IP handshake reaches out to your ISP and asks to get the IP Address of a domain name (website) you are visiting. This...
Force TLS in .NET Versions before ASP.NET 4.7 default to making outbound connections using TLS 1.0. This is a real problem for security for many reasons. It's now been deprecated with many CVEs. Some of these vulnerabilities make TLS 1.0 vulnerable to man-in-the-middle attacks. A lot of APIs will not accept incoming requests from...
CTFs I've Completed These are CTFs I've completed. I typically try and go as far as I can and only use a walkthrough if I get stuck. A "*" designates that I was able to find, exploit and root a box with the most minimal assistance, meaning I knew what to do but needed...
Command Line MySQL for Hackers Learning to connect to a MySQL server via command line is extremely useful in many situations especially for penetration testing. It's quick, easy to learn and the fastest way to get in. General MySQL CLI Connect to the Database
Software Developer, Designer, WordPress, XRM, InfoSec, DevOps, Hapkidoist and Explorer

WEATHER

High Point
light rain
45.6 ° F
49 °
42 °
20 %
1.3mph
1 %
Sat
54 °
Sun
53 °
Mon
45 °
Tue
64 °
Wed
65 °

POPULAR ARTICLES