Post Exploitation Command Lists
I’ve had a private list of commands that I run on Windows or Linux when I pop a shell, as I’m sure most pentesters do. It isn’t so much a thing of hoarding as much it is just jumbled notes that are...
View ArticleMultiple Dictionaries or Wordlists Using John the Ripper
John the ripper only takes one word list at a time. There are plenty of docs out there that show you how to cat all of your dictionaries into John’s stdin function but I like to run rules against my...
View ArticleDisconnect Stalled SSH Session
This doesn’t really apply to Windows users as you can just close puTTy. But for everyone else, stalled SSH Sessions suck. You are either slamming enter to get it to realize it’s been disconnected or...
View ArticleWho Is Logged In? A Quick Way To Pick Your Targets
Say you go for the 500+ shells on an internal test or your phishing exersice goes way better than you thought. Well you need to get your bearings quickly and going into each shell and doing a ps, then...
View Article#DerbyCon Approaches...
Chris Gates (@carnal0wnage) and I will be speaking at DerbyCon next week: The Dirty Little Secrets They Didn’t Teach You In Pentesting Class“This talk is about methodologies and tools that we use or...
View ArticleCreate a 64bit Process From a x86/32bit One
On Vista and above there is a Windows ‘Redirector’ (A redirector is basically a Symlink or fake directory that’s there but not in Windows) (more info here.aspx”)) that allows a 32bit process create a...
View ArticleThe Dirty Little Secrets They Didn't Teach You In Pentesting Class
Video: Slides: The Dirty Little Secrets They Didn’t Teach You In Pentesting Class [slideshare id=9530403] Code: https://github.com/mubix/Not-In-Pentesting-Class
View ArticleMSFConsole Prompt Fiddling
In @carnal0wnage and my presentation at DerbyCon 2011 we talked about using SCREEN and SCRIPT to keep connections live / use them across SSH sessions, and log everything that happens. What we didn’t...
View ArticleRun POST Modules On All Sessions
Jcran recently blogged about an easy way to run a post module on all sessions: http://blog.pentestify.com/simple-framework-domain-token-scanner msf> use post/windows/gather/enum_domain_tokens msf...
View Article12 Days of No Starch Press
This Christmas I’ve decided to spread a little cheer (aka free stuff) ;-) , and I’m doing it in 2600 fashion. Now, I don’t know if I have enough readers to pull this off, but here goes: I will be...
View ArticleFirst day of a No Starch Christmas - Winner
Our first day of No Starch winner is Russ with Room 362 right next to the Fire Hose ;-) 1st Day of @NoStarch Winner
View ArticleHash Types for John the Ripper
Pentest Monkey is a great resource for a lot of things. One of which is this: John The Ripper Hash Formats | pentestmonkey I used it, plus a bit of bash fu to try to figure out some hashes that I was...
View ArticleShared Links
When Google Reader decided to remove everything it was good for, we all scrambled to find new homes for things we wanted to share. Tumblr became a place that most of us flocked. I’ve found Tumblr to be...
View ArticleHak5 Segment Sneak Peak
Since it’s Christmas and all, I thought I’d post the code snippet from my Hak5 segment a bit early: #include <Clipboard.au3> #include <File.au3> $oldclip = "" While 1 $clip =...
View Article(UAC) User Assisted Compromise
A number of times during tests I’ve actually run into those mythical creatures called “patched windows machines”. At DerbyCon Chris Gates and I released the “Ask” post module (which I had failed to...
View ArticleA @textfiles approach at gathering the world's DNS - Slides
This is my talk that I gave at ShmooCon 2012. It was a great honor to be given the chance to speak at ShmooCon as it has been my second home since 2006 (missed the first one… havent missed one since) A...
View ArticleMS08_068 + MS10_046 = FUN UNTIL 2018
*TL;DR:* SMB Relay + LNK UNC icons = internal pentest pwnage I need to touch on the highlights of two vulnerabilities before we talk about the fun stuff, but I highly encourage you to read the...
View ArticleDeveloping the LNK Metasploit post module with Mona
I have been using the LNK trick I talked about in my last post for a while, but always needing a Windows machine to create the LNK file. When I decided to write a post about it, I wanted to put the...
View ArticleWho is on your dream team red team?
This was an honest idea to help identify people that might not get the media attention of other “Top X in Infosec” lists. But I should have known better than to put a poll on the internet…
View ArticleHow to Win CCDC - Slides
Since this is a constantly updating slide deck I figured I’d post it here so I didn’t have to keep emailing it out. ;-) If you have comments or if something is wrong grammatically, technically or in...
View Article