WinRM_Brute_Scanner Guide

I wrote this script to be able to scan for this service on a Windows system. Because this uses PowerShell commands, no AV should interfere, and no additional modules are required. Once obtained, remote commands can be sent.

Hacking Windows Remote Management (WinRM)

“Windows Remote Management (WinRM) is the Microsoft implementation of WS-Management Protocol, a standard Simple Object Access Protocol (SOAP)-based, firewall-friendly protocol that allows hardware and operating systems, from different vendors, to interoperate....

Meterpreter Basics

Meterpreter is a very powerful payload that can be dropped using an exploit in Metasploit. Once obtained, there is quite a lot that you can do. This is what I’m going to cover below. To find out more about Meterpreter, click the link below. This site also has examples on how to use the modules........

Windows Shell – Discovery Stage

Sometimes you don’t always need a Meterpreter shell. Depending on the intent, Netcat might be all you need. The benefit being that Windows Defender still doesn’t see Netcat as a threat which could get you a shell.......

Fix A Slow Laptop (Windows)

After time, computers become slower. It’s a way of life. The more we use our laptops the more they move away from the original clean image. Think of it like a new house. When you first move in, everything is tidy, and the place looks fresh. Give it a year or two and the same house, looks complete different.......

Bypassing 2FA With Cookies!

If you have two-factor authentication (2FA) enabled on your account, you can’t be compromised, right? Well, not exactly. As technology advances, so do the attackers. Phishing attacks have become more sophisticated and attackers are finding ways to bypass 2FA. The reason why is because of the delicious cookies stored in your browser. Session cookies are a way to show the server that the user has already authenticated. This includes passing the 2FA.......

Using Open Source Intelligence (OSINT)

Recently, Netflix’s ‘The Great Hack’ has sparked a lot of interest around data privacy. The documentary covers Cambridge Analytica and how they abused user’s data, so that they could push an “agenda” for the highest bidder.....

Create a website or blog at WordPress.com

Up ↑