Skip to main content

15 docs tagged with "review"

Docs tagged with "review" are getting a little long in the tooth and/or may need more information.

View all tags

ALFA AWUS036ACH

Here's how to setup this card to get into monitor mode and start enumerating/attacking APs

bettercap

Notes: totally underconstruction while I review bettercap's CLI and see what's still relevant.

coercer.py

Coerce auth from a victim to a system of your choice

net.exe

Very helpful in the Windows world for mapping drives, changing local/domain group memberships, and much more!

Pentest dropboxes

Right now the best source I have for this is the pentest dropbox episodes for the 7 Minute Security podcast. I'll start moving over cmd-line snippets and other tips from those episodes over time.

Pwned Passwords

Note: this document hasn't been updated for a few years but I pulled it over from the original BPATTY because I think it has some great info that is hopefully still relevant as far as integrating the Pwned Passwords.

rbcd.py

Example of doing the RBCD attack when you have the TGT of a user with write access to a victim machine

reg.exe

Handy for manipulating the registry!

WEFFLES

At the time of this writing, it doesn't look like the Microsoft WEFFLES is getting updates any more, but I wanted to preserve my install instructions from the old BPATTY anyways: