Skip to main content

Recently Updated Pages

Have I Helped You Today?

The goal of this blog is to share technical and educational content that is well-documented, easy...

Updated 1 day ago by 0xBEN

Enumerating Hosts and Identifying the Domain Controllers

Active Directory Initial Attack Vectors

Enumerating Live Hosts Internal ARP-Scan Since this is an internal assessment, Kali is on the ...

Updated 2 days ago by 0xBEN

Dumping Hashes without Mimikatz

Active Directory Post Exploitation: Attacks

Post-Compromise on Target Lsass Process Dump Sysinternals ProcDump Download ProcDump here # D...

Updated 3 days ago by 0xBEN

List Nmap Top Ports

Nmap

Purpose If you're running a lengthy nmap scan and do not want to enumerate all 65,535 TCP (or UD...

Updated 4 days ago by 0xBEN

Proxmox: Unprivileged LXC Workaround

Linux Administration Joining Linux Hosts to Active Directory...

Unprivileged LXC Workaround Upon joining a host to the Active Directory domain, it was impossibl...

Updated 4 days ago by 0xBEN

Example Playbook from Start to Finish

Ansible Automation with Ansible

Configuring Ansible Copy the global config to my home directory. That way, I'll keep my Ansible ...

Updated 1 week ago by 0xBEN

Canon Printer: Scan to USB

Printers Canon ImageClass MF644CDW

Disk Compatibility Formatting a USB drive in FAT32 on a Windows computer will cause the printer ...

Updated 2 weeks ago by 0xBEN

Computer Networking: IP Addressing and Subnetting

PJPT & PNPT Study Group Lessons Session 2: Nov. 13, 2023

IP Addressing Common Computer Numbering Systems Binary (base 2) -- 0 to 1 Octal (base 8) -- ...

Updated 3 weeks ago by 0xBEN

Lesson Plan

PJPT & PNPT Study Group Lessons Session 8: Jan. 8, 2024

Accompanying Presentation The PJPT Study Group is hosted by my friend and fellow Discord mod, Sh...

Updated 3 weeks ago by 0xBEN

Export a Proxmox VM to VirtualBox

Proxmox

Example VM I want to export the pfsense-deleteme VM and import it into VirtualBox. The procedure...

Updated 1 month ago by 0xBEN

VirtualBox: Getting Rid of the Turtle

Windows Administration

Problem Microsoft has continued to push many aspects of Windows security under the Hyper-V platf...

Updated 1 month ago by 0xBEN

File Transfer Techniques

File Transfers and Data Exfiltration

TFTP If the target has a TFTP client installed, Metasploit has a TFTP server you can run ad-hoc ...

Updated 1 month ago by 0xBEN

xfreerdp

Active Directory Post Exploitation: Attacks

Usage and Help Display the xfreerdp man page man xfreerdp Display the xfreerdp help output on ...

Updated 1 month ago by 0xBEN

POP3

Mail Mapping Mailboxes with Mutt

Create the Config File nano ./username-muttrc You should only need to change the username, pass...

Updated 1 month ago by 0xBEN

IMAP

Mail Mapping Mailboxes with Mutt

Create the Config File nano ./username-muttrc You should only need to change the username, pass...

Updated 1 month ago by 0xBEN

Change to KDE Plasma Desktop Environment

Kali Optimizations

Installing KDE Plasma Official Documentation: https://www.kali.org/docs/general-use/switching-de...

Updated 1 month ago by 0xBEN

Port Forwarding with Chisel

Network Pivoting Port Forwarding

GitHub Download from the Releases Page Usage Requires a copy of the Chisel binary on: The...

Updated 1 month ago by 0xBEN

Using Faketime for Ad-Hoc Kerberos Authentication

Active Directory Initial Attack Vectors

Installing Faketime sudo apt install faketime faketime -h This will run the specified 'progr...

Updated 1 month ago by 0xBEN

Extracting Kerberos AS-REQ Pre-Auth Hashes from PCAPs

Active Directory Post Exploitation: Enumeration

PCAP Analysis Note the existence of KRB5 protocol traffic on tcp/88, which is further identifi...

Updated 1 month ago by 0xBEN

Kerberos Pre-Auth Username Enumeration

Active Directory Initial Attack Vectors

How it Works We can send a request for a TGT --- without a pre-authentication hash --- to the Ke...

Updated 1 month ago by 0xBEN