Windows Persistence with PowerShell Empire

This is the third article in our empire series, through this we will learn elevated persistence methods. Its trigger method is pretty organised with storage options contained within each module. In Empire, the elevated persistence modules use trigger method and different storage options are required in different modules.  All of these persistence modules are based… Continue reading →
The post Windows Persistence with PowerShell Empire appeared first on Hacking Articles.

Link: https://www.hackingarticles.in/windows-persistence-with-powershell-empire/

Post Exploitation on Saved Password with LaZagne

This article will be focused on The LaZagne project and its usage in Post Exploitation. Table of Content: Introduction of LaZagne Project Syntax and Parameters Achieve Meterpreter and Upload LaZagne Help Screen Mails Argument Windows Argument Browsers Argument Databases Argument Wi-Fi Argument All Argument oN Parameter Verbose Mode Parameter Quiet Parameter Introduction of LaZagne Project… Continue reading →
The post Post Exploitation on Saved Password with LaZagne appeared first on Hacking Articles.

Link: https://www.hackingarticles.in/post-exploitation-on-saved-password-with-lazagne/

UPDATE: Kali Linux 2019.1 Release!

PenTestIT RSS Feed
Kali Linux 2019.1 is the latest Kali Linux release. This is the first 2019 release, which comes after Kali Linux 2018.4, that was made available in the month of October. This new release includes all patches, fixes, updates, and improvements since the last release – Kali Linux 2018.3, including a shiny new Linux kernel versionRead more about UPDATE: Kali Linux 2019.1 Release!
The post UPDATE: Kali Linux 2019.1 Release! appeared first on PenTestIT.

Link: http://pentestit.com/update-kali-linux-2019-1-release/

Comprehensive Guide on Snort (Part 1)

This article will introduce a guide to understand IDS using Snort as an example for it. Table of Content : Introduction to IDS Categories of IDS Types of IDS Introduction to Snort Introduction to IDS IDS Stands for Intrusion Detection System. The techniques and methods on which an IDS is founded on are used to… Continue reading →
The post Comprehensive Guide on Snort (Part 1) appeared first on Hacking Articles.

Link: https://www.hackingarticles.in/comprehensive-guide-on-snort-part-1/

Penetration Testing on Memcached Server

In our previous article, we learned how to configure Memcached Server in Ubuntu 18.04 system to design our own pentest lab. Today we will learn multiple ways to exploit Memcached Server. Table of Contents Dumping data from the Memcached server manually. Dumping data using libmemcached-tools. Dumping data using Metasploit. Monitoring using Watchers. Requirements Target: Memcached… Continue reading →
The post Penetration Testing on Memcached Server appeared first on Hacking Articles.

Link: https://www.hackingarticles.in/penetration-testing-on-memcached-server/

BeEF – The Browser Exploitation Framework Project

What is BeEF?BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser.Amid growing concerns about web-borne attacks against clients, including mobile clients, BeEF allows the professional penetration tester to assess the actual security posture of a target environment by using client-side attack vectors. Unlike other security frameworks, BeEF looks past the hardened network perimeter and client system, and examines exploitability within the context of the one open door: the web browser. BeEF will hook one or more web browsers and use them as beachheads for launching directed command modules and further attacks against the system from within the browser context.Get InvolvedYou can get in touch with the BeEF team. Just check out the following:Please, send us pull requests!Web: https://beefproject.com/Bugs: https://github.com/beefproject/beef/issuesSecurity Bugs: security@beefproject.comIRC: ircs://irc.freenode.net/beefprojectTwitter: @beefprojectRequirementsOperating System: Mac OSX 10.5.0 or higher / modern LinuxRuby: 2.3 or newerSQLite: 3.xNode.js: 6 or newerThe gems listed in the Gemfile: https://github.com/beefproject/beef/blob/master/Gemfilebrew install selenium-server-standalone (See https://github.com/shvets/selenium)Quick StartThe following is for the impatient.The install script installs the required operating system packages and all the prerequisite Ruby gems:$ ./installFor full installation details, please refer to INSTALL.txt.We also have an Installation page on the wiki.Upon successful installation, be sure to read the Configuration page on the wiki for important details on configuring and securing BeEF.UsageTo get started, simply execute beef and follow the instructions: $ ./beefVideoDownload Beef

Link: http://feedproxy.google.com/~r/PentestTools/~3/W1UXPoIIVbg/beef-browser-exploitation-framework.html

Windows Firewall Post Exploitation with Netsh

This article is will provide an in-depth post exploitation guide to gather all the information about the victim’s Firewall and network settings. Table of Content : Introduction to Firewall Rules of Firewall Advantages of Firewall Types of Firewall Importance of firewall Introduction to netsh How to block a TCP Port on remote PC How to… Continue reading →
The post Windows Firewall Post Exploitation with Netsh appeared first on Hacking Articles.

Link: https://www.hackingarticles.in/windows-firewall-post-exploitation-with-netsh/

TrevorC2 – Command and Control

TrevorC2 is command and control framework. It is a client/server model which works through a browser masquerading as C2 tool. It works on different time intervals which makes it almost impossible to be detected. This tool is coded in python but it’s also compatible with c#, PowerShell, or any other platform. this is supported by… Continue reading →
The post TrevorC2 – Command and Control appeared first on Hacking Articles.

Link: https://www.hackingarticles.in/trevorc2-command-and-control/

Bypass Application Whitelisting using cmstp

By default, Applocker allows the executing of binaries in the folder that is the major reason that it can be bypassed. It has been found that such binaries can easily be used in order to bypass Applocker along with UAC. One of such binary related to Microsoft is CMSTP. CMSTP welcomes INF files and so… Continue reading →
The post Bypass Application Whitelisting using cmstp appeared first on Hacking Articles.

Link: https://www.hackingarticles.in/bypass-application-whitelisting-using-cmstp/

Kaboom – Automatic Pentest

kaboom is a script that automates the penetration test. It performs several tasks for each phase of pentest:Information gathering [nmap-unicornscan] TCP scanUDP scanVulnerability assessment [nmap-nikto-dirb-searchsploit-msfconsole]It tests several services: smbsshsnmpsmtpftptftpms-sqlmysqlrdphttphttpsand more…It finds the CVEs and then searchs them on exploit-db or Metasploit db. Exploitation [hydra] brute force sshUsagekaboom supports two mode:Interactive mode:kaboom [ENTER] …and the script does the restNON-interactive mode:kaboom <nic> <target_ip> [-s or –shutdown]If you use the shutdown option, kaboom will shutdown the machine at the end of tasks.If you want see this help:kaboom -h (or –help)Directory Hierarchykaboom saves the results of commands in this way:Download Kaboom

Link: http://www.kitploit.com/2019/02/kaboom-automatic-pentest.html