Home

Basic SSl Pininng Bypass

Basic SSL Pinning Bypass This tutorial will guide you through setting up Burp Suite, configuring certificates on an Android emulator, and using Frida for ssl pinning bypass. Prerequisites Burp Suite installed on your machine. Android emulator set up and running. OpenSSL installed. Frida installed. 1. Download the Burp Suite Certifi...

Read more

C2 Server

Quick guide on how to configure a C2 server with Digital Ocean, Cloudflare and Havoc It is important to understand that there is no evasion technique and best practice of OPSEC in this tutorial. This is just a “how to setup a basic C2 server” What is a C2 server A C2 server, also known as a Command and Control server, is a type of server used ...

Read more

AD Checklist

AD checklist Enumeration Network and service discovery a. Network mapping (Bloodhound) - Reachable High value targets - High value groups - RDP on machines - GPO b. Identifying domain controllers c. Start responder to capture hash d. Finding Exposed Services - LDAP - SMB - Kerberos - MSSQL e. Check if additional interf...

Read more

Bufferoverflow

Credits This tutorial - steps to follow have been built from the Buffer Overflow Prep room on Try Hack Me. Prerequisite To be able to make a buffer overflow you need three things: Linux Machine Windows Machine Imminuty debugger install in the windows machine The mona python program present on your windows machine Steps to follow Run...

Read more

OSCP notes

My OSCP notes Active Directory Enumeration SMB SMBCLIENT no pass session smbclient --no-pass -L //<IP> Get list of shares on the target smbclient -L //<IP>/ Login with no password and no username smbclient -L //<IP>/ -U '' -N Login with username smbclient -L //<IP>/ -U ...

Read more

Abuse Unprotected Admin Functionality

***In this tutorial you will learn how to abuse an unprotected admin functionality.*** Prerequisites functional installation of burp Burp academy account. Goal To solve the lab, we have to delete de user carlos by accesing the admin panel Tutorial 1 - Intercept the request 2 - Change the path for /robots.txt 3 - In the robots.tx...

Read more

Tutorial Bloodhound

In this tutorial you will learn how to output the hashes with bloodhound-python and display the data as a schema in bloodhound. Prerequisites Valid credentials on a machine linked to the domain. neo4j, bloodhound and bloodhound-python must be installed on your attacking machine. What is Bloodhound BloodHound is an Active Directory (AD) r...

Read more

Pivoting with sshuttle and proxychains

In this tutorial you will learn how to setup sshutle and proxychains to pivot through a network. SSHUTTLE What is sshuttle sshuttle allows you to create a VPN connection from your machine to any remote server that you can connect to via ssh, as long as that server has a sufficiently new Python installation. To work, you must have root access o...

Read more