Kali Linux
-
NBT-NS Poisoning and Exploitation with Responder
Comprehensive Guide: NBT-NS Poisoning and Exploitation with Responder Introduction to NBT-NS Poisoning NetBIOS (Network Basic Input/Output System) is a legacy protocol suite that facilitates communication over local area networks (LANs) in Windows-based systems.…
-
ICMP and How to Attack
Understanding ICMP Attacks: Threats and Countermeasures In the realm of cybersecurity, ICMP (Internet Control Message Protocol) attacks represent a significant category of threats aimed at exploiting vulnerabilities within networking protocols. This blog delves…
-
Finding and Exploiting DLL Hijacking Vulnerabilities
Discovering DLL Hijacking Vulnerabilities Using Process Monitor In this lab, we delve into the intricacies of identifying and exploiting DLL Hijacking vulnerabilities using Process Monitor on a Windows environment. This exercise will equip…
-
Bypassing AV – Avast, on a Windows 7
Bypassing Avast Antivirus: A Hands-On Guide In today’s cybersecurity landscape, bypassing antivirus (AV) software is a critical skill for penetration testers and malicious actors alike. In this lab, we’ll explore how to bypass…
-
Leveraging PowerShell During Exploitation – Empire
Using Empire is another powerful approach for attackers looking to leverage PowerShell for exploitation and maintaining control over compromised systems. Empire is a post-exploitation framework that facilitates various attack vectors and includes modules…
-
Leveraging PowerShell During Exploitation
Leveraging PowerShell during exploitation is a common technique used by attackers due to its powerful capabilities and its presence on most Windows systems. Here are several methods and techniques for using PowerShell during…