Skip to main content

Recently Updated Pages

Windows: Unattended Sleep Timeout

Windows Administration

Problem A Windows guest running under the Proxmox hypervisor repeatedly powers off despite havin...

Updated 3 days ago by 0xBEN

VirtualBox: Getting Rid of the Turtle

Windows Administration

Problem Microsoft has continued to push many aspects of Windows security under the Hyper-V platf...

Updated 1 week ago by 0xBEN

NoMachine Customizations

Kali Optimizations

Auto-Login On Kali side, go to Startup & Shutdown > Login Screen (SDDM) and click Behavior . Set...

Updated 2 weeks ago by 0xBEN

XRDP Server on KDE Plasma

Linux Administration

Install and Configure XRDP # Install xRDP server sudo apt update && sudo apt install -y xrdp db...

Updated 2 weeks ago by 0xBEN

Computer Networking: IP Addressing and Subnetting

PJPT & PNPT Study Group Lessons Session 2: Nov. 13, 2023

IP Addressing Common Computer Numbering Systems Binary (base 2) -- 0 to 1 Octal (base 8) -- ...

Updated 3 weeks ago by 0xBEN

Change to KDE Plasma Desktop Environment

Kali Optimizations

Installing KDE Plasma Official Documentation: https://www.kali.org/docs/general-use/switching-de...

Updated 3 weeks ago by 0xBEN

Multipart Forms and Boundary Parameters

Web General

Multipart/Form-Data Example Example Web Form Consider the following web form... File Uploa...

Updated 1 month ago by 0xBEN

Port Forwarding with Chisel

Network Pivoting Port Forwarding

GitHub Download from the Releases Page Usage Requires a copy of the Chisel binary on: The...

Updated 1 month ago by 0xBEN

Have I Helped You Today?

The goal of this blog is to share technical and educational content that is well-documented, easy...

Updated 1 month ago by 0xBEN

Enumerating Hosts and Identifying the Domain Controllers

Active Directory Initial Attack Vectors

Enumerating Live Hosts Internal ARP-Scan Since this is an internal assessment, Kali is on the ...

Updated 1 month ago by 0xBEN

Dumping Hashes without Mimikatz

Active Directory Post Exploitation: Attacks

Post-Compromise on Target Lsass Process Dump Sysinternals ProcDump Download ProcDump here # D...

Updated 1 month ago by 0xBEN

List Nmap Top Ports

Nmap

Purpose If you're running a lengthy nmap scan and do not want to enumerate all 65,535 TCP (or UD...

Updated 1 month ago by 0xBEN

Proxmox: Unprivileged LXC Workaround

Linux Administration Joining Linux Hosts to Active Directory...

Unprivileged LXC Workaround Upon joining a host to the Active Directory domain, it was impossibl...

Updated 1 month ago by 0xBEN

Example Playbook from Start to Finish

Ansible Automation with Ansible

Configuring Ansible Copy the global config to my home directory. That way, I'll keep my Ansible ...

Updated 1 month ago by 0xBEN

Canon Printer: Scan to USB

Printers Canon ImageClass MF644CDW

Disk Compatibility Formatting a USB drive in FAT32 on a Windows computer will cause the printer ...

Updated 2 months ago by 0xBEN

Lesson Plan

PJPT & PNPT Study Group Lessons Session 8: Jan. 8, 2024

Accompanying Presentation The PJPT Study Group is hosted by my friend and fellow Discord mod, Sh...

Updated 2 months ago by 0xBEN

Export a Proxmox VM to VirtualBox

Proxmox

Example VM I want to export the pfsense-deleteme VM and import it into VirtualBox. The procedure...

Updated 2 months ago by 0xBEN

File Transfer Techniques

File Transfers and Data Exfiltration

TFTP If the target has a TFTP client installed, Metasploit has a TFTP server you can run ad-hoc ...

Updated 2 months ago by 0xBEN

xfreerdp

Active Directory Post Exploitation: Attacks

Usage and Help Display the xfreerdp man page man xfreerdp Display the xfreerdp help output on ...

Updated 2 months ago by 0xBEN

POP3

Mail Mapping Mailboxes with Mutt

Create the Config File nano ./username-muttrc You should only need to change the username, pass...

Updated 2 months ago by 0xBEN