AD Recon – NetBIOS (137/138/139) and SMB (445) Part-2
In this post, we will be continuing with Part-2 of NetBIOS and SMB enumeration. I highly suggest you read Part-1 before continuing with this post, as we will be continuing right where…
In this post, we will be continuing with Part-2 of NetBIOS and SMB enumeration. I highly suggest you read Part-1 before continuing with this post, as we will be continuing right where…
In this two-part post on AD Recon, we will review various tools that can be used to enumerate the NetBIOS (UDP port 137/138 | TCP port 139) and SMB (TCP port 445)…
In this post, we will look at a few tools that we can use to enumerate MSRPC over SMB through UDP port 135, as well as TCP ports 135, 139, and 445.…
In this post, we will look at a few different tools that we can use to enumerate the MSRPC service running on TCP/UDP port 135. We will start with a brief introduction…
In this Walkthrough, we will be hacking the machine Cascade from HackTheBox. To begin, we will quickly find that we are able to dump information from LDAP using an anonymous session. During…
In this post, we will go over various techniques that allow us to perform file transfers from our attacker machine onto a victim Linux host (download), as well as from a victim…
In this post, we will be continuing with Part-2 on how to escalate privileges by abusing the sudo binary / privilege. If you have not checked out Part-1 yet, I strongly suggest starting there before reading…
For this two-part post on Linux Privilege Escalation techniques, we will be deep-diving into the various ways to exploit the sudo binary / privilege. This post ended up being longer than I…
In this post, we will explore how an attacker can escalate privileges from a standard user to root by exploiting the Fail2Ban service. We will begin by learning what Fail2Ban is, how…