Windows Firewall Post Exploitation with Netsh

This article is will provide an in-depth post exploitation guide to gather all the information about the victim’s Firewall and network settings. Table of Content : Introduction to Firewall Rules of Firewall Advantages of Firewall Types of Firewall Importance of firewall Introduction to netsh How to block a TCP Port on remote PC How to… Continue reading →
The post Windows Firewall Post Exploitation with Netsh appeared first on Hacking Articles.

Link: https://www.hackingarticles.in/windows-firewall-post-exploitation-with-netsh/

TrevorC2 – Command and Control

TrevorC2 is command and control framework. It is a client/server model which works through a browser masquerading as C2 tool. It works on different time intervals which makes it almost impossible to be detected. This tool is coded in python but it’s also compatible with c#, PowerShell, or any other platform. this is supported by… Continue reading →
The post TrevorC2 – Command and Control appeared first on Hacking Articles.

Link: https://www.hackingarticles.in/trevorc2-command-and-control/

Bypass Application Whitelisting using cmstp

By default, Applocker allows the executing of binaries in the folder that is the major reason that it can be bypassed. It has been found that such binaries can easily be used in order to bypass Applocker along with UAC. One of such binary related to Microsoft is CMSTP. CMSTP welcomes INF files and so… Continue reading →
The post Bypass Application Whitelisting using cmstp appeared first on Hacking Articles.

Link: https://www.hackingarticles.in/bypass-application-whitelisting-using-cmstp/

Kaboom – Automatic Pentest

kaboom is a script that automates the penetration test. It performs several tasks for each phase of pentest:Information gathering [nmap-unicornscan] TCP scanUDP scanVulnerability assessment [nmap-nikto-dirb-searchsploit-msfconsole]It tests several services: smbsshsnmpsmtpftptftpms-sqlmysqlrdphttphttpsand more…It finds the CVEs and then searchs them on exploit-db or Metasploit db. Exploitation [hydra] brute force sshUsagekaboom supports two mode:Interactive mode:kaboom [ENTER] …and the script does the restNON-interactive mode:kaboom <nic> <target_ip> [-s or –shutdown]If you use the shutdown option, kaboom will shutdown the machine at the end of tasks.If you want see this help:kaboom -h (or –help)Directory Hierarchykaboom saves the results of commands in this way:Download Kaboom

Link: http://www.kitploit.com/2019/02/kaboom-automatic-pentest.html

Red Team/Blue Team Practice on Wdigest

In this article, we will show you the methods of protecting your system against MIMIKATZ that fetches password in clear text from wdigest. As you know the Pen-tester and the red team uses mimikatz for testing password capacity. For the complete information on how mimikatz works visit this link: https://www.hackingarticles.in/understanding-guide-mimikatz/ Table of Contents Introduction System… Continue reading →
The post Red Team/Blue Team Practice on Wdigest appeared first on Hacking Articles.

Link: https://www.hackingarticles.in/red-team-blue-team-practice-on-wdigest/

Bypass Application Whitelisting using Weak Path Rule

Finding loopholes is very important when you are the part of a pen-testing team. Because such loopholes are the source of hacking as the attacker will actively look for them. So in order to patch such loopholes, you must know how to and where to find them. One of such loopholes is something known as… Continue reading →
The post Bypass Application Whitelisting using Weak Path Rule appeared first on Hacking Articles.

Link: https://www.hackingarticles.in/bypass-application-whitelisting-using-weak-path-rule/

Multiple Ways to Exploiting Windows PC using PowerShell Empire

This is our second post in the article series ‘PowerShell Empire’. In this article we will cover all the exploits that leads to windows exploitation with empire. To our first post on empire series, which gives a basic guide to navigate your way through empire, click here. Table of content: Exploiting through HTA Exploiting through… Continue reading →
The post Multiple Ways to Exploiting Windows PC using PowerShell Empire appeared first on Hacking Articles.

Link: https://www.hackingarticles.in/multiple-ways-to-exploiting-windows-pc-using-powershell-empire/

Jenkins Pentest Lab Setup

You all know that we have performed so many ctf challenges and we got to know about jenkins there.so lets know about jenkins better. For this we are here with the new challenges which you will face performing ctf challenges.to do it in a easier way we are here with a new article.so let’s do… Continue reading →
The post Jenkins Pentest Lab Setup appeared first on Hacking Articles.

Link: https://www.hackingarticles.in/jenkins-pentest-lab-setup/

Exploiting Windows using Contact File HTML Injection/RCE

After the 0 day exploit on malicious VCF file in windows, cyber security researcher John Page deserves another round of applause for bringing this vulnerability onto exploit-db’s eye on 23rd January 2019. This vulnerability further exploits the RCE vulnerability present in VCF with HTML injections. To read the previous article follow the link here. Introduction:… Continue reading →
The post Exploiting Windows using Contact File HTML Injection/RCE appeared first on Hacking Articles.

Link: https://www.hackingarticles.in/exploiting-windows-using-contact-file-html-injection-rce/

BEEMKA: Basic Electron Post-Exploitation Framework

PenTestIT RSS Feed
There are a lot of applications today that use Electron Framework, as it helps you build cross platform desktop apps with JavaScript, HTML, and CSS. Examples are applications such as Skype, Station, etc. A new post-exploitation framework – BEEMKA can now help you in maintaining access and exfiltration. What is BEEMKA? BEEMKA is a modular,Read more about BEEMKA: Basic Electron Post-Exploitation Framework
The post BEEMKA: Basic Electron Post-Exploitation Framework appeared first on PenTestIT.

Link: http://pentestit.com/beemka-basic-electron-exploitation-framework/