Scanning Big Networks - Alternative Methods
Alternative to scanning methods to achieve network, host and port identification. This post covers Active Directory domains and Kubernetes clusters.
Alternative to scanning methods to achieve network, host and port identification. This post covers Active Directory domains and Kubernetes clusters.
Advanced topics on network, host and port identification with defense evasion, automation of the scanning and results visualization.
An overview of optimizing methods for network, host and port identification with nmap tool.
Hi! In this post I want to share my OSWP journey with you. I’ve passed it with my first attempt in February, 2024. It was a small journey and I want to review it and provide some tips here. The Co...
Hi! In this post I want to share my OSCP journey with you. I’ve passed it with my first attempt in July, 2023. Now I study for the OSEP exam and I want to refresh and review some thoughts on OSCP. ...
Introduction Hi! In this post I want to explore Windows File Transfers. There’s several ways to transfer files from our attacking machine to the Windows target, and from the Windows target to our ...
Introduction Hi! In this post I want we will explore some ways to optimize hash cracking. We can do it in many ways, for example by optimizing our cracking algorithms or improving hardware part. O...
There are a lot of situations, when you have to compile an exploit for a specific version of Windows, for example, to make a privilege escalation. But you have only Kali Linux and no idea how to de...
I had to install a Windows 10 VM to do some researches. But I’ve got a problem after the installation. There was not a Microsoft Store and of course I had to install some MS Store specific applicat...
Hi! In this post we continue exploring Vim and its features. Today we discuss some useful settings (or configuration) in Vim. I don’t think it is a full guide for Vim settings, I’ll show just featu...