Recently Updated Pages
Have I Helped You Today?
The goal of this blog is to share technical and educational content that is well-documented, easy...
Enumerating Hosts and Identifying the Domain Controllers
Enumerating Live Hosts Internal ARP-Scan Since this is an internal assessment, Kali is on the ...
Dumping Hashes without Mimikatz
Post-Compromise on Target Lsass Process Dump Sysinternals ProcDump Download ProcDump here # D...
List Nmap Top Ports
Purpose If you're running a lengthy nmap scan and do not want to enumerate all 65,535 TCP (or UD...
Proxmox: Unprivileged LXC Workaround
Unprivileged LXC Workaround Upon joining a host to the Active Directory domain, it was impossibl...
Example Playbook from Start to Finish
Configuring Ansible Copy the global config to my home directory. That way, I'll keep my Ansible ...
Canon Printer: Scan to USB
Disk Compatibility Formatting a USB drive in FAT32 on a Windows computer will cause the printer ...
Computer Networking: IP Addressing and Subnetting
IP Addressing Common Computer Numbering Systems Binary (base 2) -- 0 to 1 Octal (base 8) -- ...
Lesson Plan
Accompanying Presentation The PJPT Study Group is hosted by my friend and fellow Discord mod, Sh...
Export a Proxmox VM to VirtualBox
Example VM I want to export the pfsense-deleteme VM and import it into VirtualBox. The procedure...
VirtualBox: Getting Rid of the Turtle
Problem Microsoft has continued to push many aspects of Windows security under the Hyper-V platf...
File Transfer Techniques
TFTP If the target has a TFTP client installed, Metasploit has a TFTP server you can run ad-hoc ...
xfreerdp
Usage and Help Display the xfreerdp man page man xfreerdp Display the xfreerdp help output on ...
POP3
Create the Config File nano ./username-muttrc You should only need to change the username, pass...
IMAP
Create the Config File nano ./username-muttrc You should only need to change the username, pass...
Change to KDE Plasma Desktop Environment
Installing KDE Plasma Official Documentation: https://www.kali.org/docs/general-use/switching-de...
Port Forwarding with Chisel
GitHub Download from the Releases Page Usage Requires a copy of the Chisel binary on: The...
Using Faketime for Ad-Hoc Kerberos Authentication
Installing Faketime sudo apt install faketime faketime -h This will run the specified 'progr...
Extracting Kerberos AS-REQ Pre-Auth Hashes from PCAPs
PCAP Analysis Note the existence of KRB5 protocol traffic on tcp/88, which is further identifi...
Kerberos Pre-Auth Username Enumeration
How it Works We can send a request for a TGT --- without a pre-authentication hash --- to the Ke...