Recently Updated Pages
Port Forwarding with Chisel
GitHub Download from the Releases Page Usage Requires a copy of the Chisel binary on: The...
Troubleshooting
Hosts Enrolling with Empty Data In my testing, the way to reproduce the issue is: Remove a ...
xRDP Server on KDE Plasma
Install and Configure xRDP # Install xRDP server sudo apt update && sudo apt install -y xrdp #...
VirtualHost Enumeration
VirtualHosts Examples NGINX /etc/nginx/sites-available/example.com.conf server { listen 80...
NoMachine Customizations
Auto-Login On Kali side, go to Startup & Shutdown > Login Screen (SDDM) and click Behavior . Set...
Web 5
Web 41: Adobe ColdFusion 8 Target: Windows Server 2008 R2 Standard Foothold: Unauthenticated File...
Create Self-Signed TLS Certificates
When You Should Do This If you have an internal/demo/test server where you'd like to encrypt tra...
Create New Key Pair for SSH
Create the Key Pair Bash # No comment, no password on key file, output to current directory as ...
NFS: LXC Backups Permissions Issue (Synology)
The Issue INFO: starting new backup job: vzdump 204 --remove 0 --compress zstd --mode snapshot -...
Clustering: Same ZFS Pool on All Nodes
Example Environment I keep my VM and container guest disks stored on a ZFS share attached to t...
pfSense: Unbound DNS Timeouts
Problem Unbound DNS resolution was timing out when querying specific domains. After looking at l...
Windows: Unattended Sleep Timeout
Problem A Windows guest running under the Proxmox hypervisor repeatedly powers off despite havin...
Linux: Booting into Single-User Mode
At the bootloader screen, press the e key to edit the GRUB configuration. Use the up arrow and...
WordPress Relative Base URL
Problem Often in some Vulnhub or other self-hosted CTF boxes, there will be a WordPress instance...
Enumerating NFS
General Information portmapper and rpcbind run on TCP 111 rpcbind maps RPC services to their ...
List Nmap Top Ports
Purpose If you're running a lengthy nmap scan and do not want to enumerate all 65,535 TCP (or UD...
SSH Port Forwarding
Security Considerations Reverse Tunneling This will require you to establish a SSH connection...
Defining Group Variables and Protecting Secrets
Group Variables Back on Defining the Inventory, you may remember that we broke the inventory up i...
GetUserSPNs.py
When to Use Useful in post-compromise enumeration. If you acquire user passwords or hashes for a...
GetADUsers.py
When to Use Helpful in post-compromise enumeration. If you've compromised a domain-joined host, ...