unconstrained kerberos delegation
Kerberos is a computer network security protocol that authenticates service requests between two or more trusted hosts across an untrusted network, like the internet. It uses secret-key cryptography and a trusted third party for authenticating client-server applications and verifying users’ identities.
<>
WHAT IS KERBEROS DELEGATION?
Ker...
google dork
Google Dorks , also known as Google Dorking or Google Hacking, is a valuable resource for security researchers. For the average person, Google is just a search engine used to find text, images, videos, and news online. However, in the infosec world, Google is a useful OSINT security tool.
Search filters
| Filter | Description ...
hydra commands
Some bruteforce terminal commands to use with Hydra. Hydra is a built-in cracking tool in Kali Linux which can work offline and online platforms. It can work in complaince with plenty of platforms. SSH, RDP, HTTP are just few of those.
hydra: bruteforce smb login
hydra -L users.txt -P passwords.txt -e nsr smb://targetIp
hydra: bruteforce ssh l...
flexispy
Brazil’s numero uno hacking group /_ / A familia! A movimento!
BTC GO HERE: 13XWdkW5sff2tUHauoEU4dKiigiMScEr7q
Twitter:@fleximinx (for now)
–[1: Introduction]——————————————————-
Hello, all!
Since FlexiSpy burnt their entire network driving us out, we think it’s
time for us to release our HowTo guide for aspiring hackers, about what we
did...
hack back diy guide
Who doesn’t like a good (true) and inspiring story?
_ _ _ ____ _ _
| | | | __ _ ___| | __ | __ ) __ _ ___| | _| |
| |_| |/ _` |/ __| |/ / | _ \ / _` |/ __| |/ / |
| _ | (_| | (__| < | |_) | (_| | (__| <|_|
|_| |_|\__,_|\___|_|\_\ |____/ \_...
cristiano
Learn while entertained…
INTRODUCTION
Hi everyone! My name is Cristiano, I am an university student at the second year of computer science. I have a lot of interesting on network security and I dream to become a penetration tester in the future. This is not only a guide to complete the Lab V.8 of PenTestIt, treat it like an understanding manual...
penetration testing tools
Penetration Testing Tools
Source: https://github.com/enaqx/awesome-pentest
Contents
Penetration Testing Tools
Contents
Android Utilities
Anonymity Tools
Tor Tools
Anti-virus Evasion Tools
Books
Malware Analysis Books
CTF Tools
...
linux pentesting commands
The commands listed below are designed for local enumeration, typical commands a penetration tester would use during post exploitation or when performing command injection etc. See our pen test cheat sheet for an in depth list of pen testing tool commands and example usage.
Linux Network Commands
COMMAND DESCRIPTION
netstat -tulpn
Show Linux ...
linux commands
The command line terminal in Linux is the operating system’s most powerful component. However, due to the sheer amount of commands available, it can be intimidating for newcomers. Even longtime users may forget a command every once in a while and that is why I have created this Linux cheat sheet commands list.
Linux Commands – A
Command Descrip...
20 post articles, 2 pages.