r3kind1e - Cybersecurity Insights and Penetration Testing

「The quieter you become, the more you are able to hear.」

Enumerating System Information

Windows Local Enumeration Enumerating System Information After gaining initial access to a target system, it is always important to learn more about the system like, what OS is running as well as t...

Post-Exploitation

Host & Network Penetration Testing: Post-Exploitation Post-exploitation is the final phase of the penetration testing process and consists of the tactics, techniques and procedures that attacke...

Obfuscating PowerShell Code

Obfuscating PowerShell Code Obfuscation Obfuscation refers to the process of concealing something important, valuable, or critical. Obfuscation reorganizes code in order to make it harder to analyz...

AV Evasion With Shellter

AV Evasion With Shellter(使用Shellter进行AV规避) Defense Evasion Defense Evasion consists of techniques that adversaries use to avoid detection throughout their compromise. Techniques used for defense ev...

Targeting SAMBA

Linux Black Box Penetration Test(Linux 黑盒渗透测试) Targeting SAMBA(针对 SAMBA) Demo: Targeting SAMBA(演示:针对 SAMBA) We’re going to be taking a look at how to exploit Samba running on the Linux target. What...

Targeting PHP

Linux Black Box Penetration Test(Linux 黑盒渗透测试) Targeting PHP(针对 PHP) Demo: Targeting PHP(演示:针对 PHP) We’re going to be taking a look at the process of exploiting PHP that is being used as part of th...

Targeting vsFTPd

Linux Black Box Penetration Test(Linux 黑盒渗透测试) Targeting vsFTPd(针对 vsFTPd) Demo: Targeting vsFTPd(演示:针对 vsFTPd) We’re going to be taking a look at how to exploit the FTP service that’s running on t...

Port Scanning & Enumeration - Linux

Linux Black Box Penetration Test(Linux 黑盒渗透测试) Port Scanning & Enumeration - Linux(端口扫描和枚举 - Linux) Demo: Port Scanning & Enumeration - Linux(演示:端口扫描和枚举 - Linux) The first step will involve...

Linux Black Box Penetration Test

Linux Black Box Penetration Test Penetration Testing Phases The following diagram outlines the various phases involved in a typical penetration test. Black Box Methodology: Host discovery P...

Targeting MySQL Database Server

Windows Black Box Penetration Test(Windows 黑盒渗透测试) Targeting MySQL Database Server(针对 MySQL 数据库服务器) Demo: Targeting MySQL Database Server(演示:针对 MySQL 数据库服务器) We’ll be taking a look at how to gain a...