People might be aware of “Group Policy Preferences” in Windows Server 2008 that allows system administrators to set up specific configurations. It can be used
PoshC2 is an open-source remote administration and post-exploitation framework that is publicly available on GitHub. The server-side components of the tool are primarily written in
In this article, we will be exploring a total of 6 tools that can craft, encrypt and exploit a Windows Machine using malicious Macros. Table
Spoof SSDP replies and create fake UPnP devices to phish for credentials and NetNTLM challenge/response. Table of Content Introduction What is SSDP? What are UPnP
In this article, we are going to describe the utility of the BITSAdmin tool and how vital it is in Windows Penetration Testing. BITSAdmin is
In this article, we will describe the utility of the Certutil tool and its importance in Windows Penetration Testing. Certutil is a preinstalled tool on
Recently, I had the pleasure and honour of receiving an invitation to add my review for the Hands-on Red Team Tactics – A Red Team
In this post you will get to know all about RED TEAM Operation and Practice, idea for this article came from the SANS SEC564 by
In this article, you will learn about the RED TEAM Operation for data exfiltration via ICMP-C2 and ICMP Tunneling because both approaches are useful in