Page not found
Sorry, The page you were looking for could not be found.
If you expected this page to exist, you might not have permission to view it.
Popular Pages
Lesson Plan
Accompanying Presentation The PJPT Study Group is hosted by my friend and fellow Discord mod, Sh...
Computer Networking: IP Addressing and Subnetting
IP Addressing Common Computer Numbering Systems Binary (base 2) -- 0 to 1 Octal (base 8) -- ...
Port Forwarding with Chisel
GitHub Download from the Releases Page Usage Requires a copy of the Chisel binary on: The...
XRDP Server on KDE Plasma
Install and Configure XRDP # Install xRDP server sudo apt update && sudo apt install -y xrdp db...
Have I Helped You Today?
The goal of this blog is to share technical and educational content that is well-documented, easy...
File Transfer Techniques
TFTP If the target has a TFTP client installed, Metasploit has a TFTP server you can run ad-hoc ...
Export a Proxmox VM to VirtualBox
Example VM I want to export the pfsense-deleteme VM and import it into VirtualBox. The procedure...
Proxmox: Unprivileged LXC Workaround
Unprivileged LXC Workaround Upon joining a host to the Active Directory domain, it was impossibl...
Kerberos Pre-Auth Username Enumeration
How it Works We can send a request for a TGT --- without a pre-authentication hash --- to the Ke...
SSH Port Forwarding
Security Considerations Reverse Tunneling This will require you to establish a SSH connection...
Popular Books
Active Directory
Also, consider taking a look at my Active Directory Attack Map. While it doesn't cover every poss...
PJPT Study Group Lessons
This book will hold all of the lesson plans and/or supplementary material for when I teach in the...
Kali Optimizations
Network Pivoting
Linux Administration
Computer Networking
SSH Administration
Windows Administration
File Transfers and Data Exfiltration
Proxmox
Repository for any notes, snippets, cheat sheets pertaining to Proxmox
Popular Chapters
Session 2: Nov. 13, 2023
Post Exploitation: Enumeration
Post Exploitation: Attacks
Initial Attack Vectors
Internal: --------- Attack vectors that are ideal for internal penetration tests, where the att...