Home

unconstrained kerberos delegation

Kerberos is a computer network security protocol that authenticates service requests between two or more trusted hosts across an untrusted network, like the internet. It uses secret-key cryptography and a trusted third party for authenticating client-server applications and verifying users’ identities. <> WHAT IS KERBEROS DELEGATION? Ker...

Read more

google dork

Google Dorks , also known as Google Dorking or Google Hacking, is a valuable resource for security researchers. For the average person, Google is just a search engine used to find text, images, videos, and news online. However, in the infosec world, Google is a useful OSINT security tool. Search filters | Filter | Description ...

Read more

hydra commands

Some bruteforce terminal commands to use with Hydra. Hydra is a built-in cracking tool in Kali Linux which can work offline and online platforms. It can work in complaince with plenty of platforms. SSH, RDP, HTTP are just few of those. hydra: bruteforce smb login hydra -L users.txt -P passwords.txt -e nsr smb://targetIp hydra: bruteforce ssh l...

Read more

flexispy

Brazil’s numero uno hacking group /_ / A familia! A movimento! BTC GO HERE: 13XWdkW5sff2tUHauoEU4dKiigiMScEr7q Twitter:@fleximinx (for now) –[1: Introduction]——————————————————- Hello, all! Since FlexiSpy burnt their entire network driving us out, we think it’s time for us to release our HowTo guide for aspiring hackers, about what we did...

Read more

finfisher

Here is the write-up/guide from the FinFisher hack, which is excellent reading. _ _ _ ____ _ _ | | | | __ _ ___| | __ | __ ) __ _ ___| | _| | | |_| |/ _ |/ __| |/ / | _ \ / _` |/ __| |/ / | | _ | (_| | (__| < | |_) | (_| | (__| <|_| |_| |...

Read more

hack back diy guide

Who doesn’t like a good (true) and inspiring story? _ _ _ ____ _ _ | | | | __ _ ___| | __ | __ ) __ _ ___| | _| | | |_| |/ _` |/ __| |/ / | _ \ / _` |/ __| |/ / | | _ | (_| | (__| < | |_) | (_| | (__| <|_| |_| |_|\__,_|\___|_|\_\ |____/ \_...

Read more

cristiano

Learn while entertained… INTRODUCTION Hi everyone! My name is Cristiano, I am an university student at the second year of computer science. I have a lot of interesting on network security and I dream to become a penetration tester in the future. This is not only a guide to complete the Lab V.8 of PenTestIt, treat it like an understanding manual...

Read more

penetration testing tools

Penetration Testing Tools Source: https://github.com/enaqx/awesome-pentest Contents Penetration Testing Tools Contents Android Utilities Anonymity Tools Tor Tools Anti-virus Evasion Tools Books Malware Analysis Books CTF Tools ...

Read more

linux pentesting commands

The commands listed below are designed for local enumeration, typical commands a penetration tester would use during post exploitation or when performing command injection etc. See our pen test cheat sheet for an in depth list of pen testing tool commands and example usage. Linux Network Commands COMMAND DESCRIPTION netstat -tulpn Show Linux ...

Read more

linux commands

The command line terminal in Linux is the operating system’s most powerful component. However, due to the sheer amount of commands available, it can be intimidating for newcomers. Even longtime users may forget a command every once in a while and that is why I have created this Linux cheat sheet commands list. Linux Commands – A Command Descrip...

Read more