Banner Grabbing and Emailing via Telnet
Telnet is a old network protocol which has been around longer then the internet. It was created for the purpose of remote access for network resources. It sends its data in plain text and is therefore...
View ArticleFreeRDP – RD Gateway client for Linux
If you are Googling for software that allows you to use remote desktop from a Linux OS through a RD Gateway to another server – Stop! I spend hours doing the same with no luck. I tried out a bunch of...
View ArticleActivPasswordChanger
In a former tutorial, I showed how to hack Windows 7 Account Password without any tools at all. In that tutorial I mentioned that there also where tools available to do this. Since I just lost the...
View ArticleMS12-020 RDP Vulnerability PoC & Analysis
In March 2012 a security breach was released regarding a vulnerability in the Remote Desktop Protocol (RDP). The vulnerability related to almost all Windows platforms, and was later released under...
View ArticleLocal File Inclusion & Remote Command Execution
Local File Inclusion (LFI) is an exploit, which involves gaining access to local system files of a web server, though a website. The vulnerability occurs when a website does not have proper validating...
View ArticleProcess Explorer
Process Explorer is like Task Manager on drugs. I have been using it for years, and every time I decide to get to the bottom of it, I get sidetracked because it has so many uses. In this tutorial, we...
View ArticleChocolatey – Apt-get for Windows
I was at a lecture introducing some of the new features of Powershell 5. One of the top selling points was the OneGet module. OneGet is a package manager for Windows much like Apt-get for *nix systems....
View ArticleMimikatz
Stored user credentials in Windows are normally not visible in plaintext for obvious reasons. But Windows stores the password in plaintext in the Local Security Authority Subsystem Service (LSASS) for...
View ArticleWPS Pixie Dust Attack
I have written about the flaw in the WPS system a few times. But a new WPS flaw has surfaced, which enables offline brute forcing of the WPS PIN, also called WPS Pixie Dust Attack. When the Registrar...
View ArticleRecovering Windows Servers
This tutorial focuses on the built-in tools in Windows, which you can use when a Windows server is not booting correctly. Booting to Safe mode Booting to safe mode eliminates all unnecessary boot up...
View Article
More Pages to Explore .....