Oct 31, 20232 minHow to write a reverse shellA reverse shell is a type of network connection in which a remote computer establishes a connection to a local computer and allows the...
May 20, 20223 minOverride Panda Hackers Reemerge, Target Sensitive InformationCybercrime is always evolving, but some threats persist despite years of change. The Override Panda cybercrime group is one such...
Dec 16, 20194 minA Walk Down Adversary Lane – ColdFusion V8As I continue my OSCP journey I have popped a few more boxes since my last blog. It’s been about a month or two so I figure I would write...
Dec 9, 20194 minInstalling Silent Trinity (0.4.6)Silent Trinity is a command and control tool dedicated to hacking into Microsoft Windows systems. The primary function is to remotely...
Oct 24, 20197 min A Walk Down Adversary Lane - XP sp1I’ve been in the business of IT/Security for about 30 years now and I am always looking for ways to improve my skillset and understanding...
Aug 15, 20193 minEternalblue with MetasploitEternalblue is the vulnerability behind major attacks such as Wannacry and NotPetya attacks. Currently it is being incorporated into...
Feb 22, 20191 minPython, IronPython, C#/.Net "OH MY" **SILENTTRINITY**My buddy, Tony G (http://illumin808.com/) came across this interesting tool a few weeks ago called SILENTTRINITY. Its a post-exploitation...
Dec 11, 20181 minFishing for Phishers Enterprise Strikes Back Phishing and social engineering has been around since Han Solo has flown the Millennium Flacon. The typically response is deleting the...
Nov 9, 20186 minTheFatRat and BeEF – Pre and Post Exploitation MethodA few weeks ago, I wrote about TheFatRat remote post exploit tool. The blog was primarily a guide to installing it and performing some...