Some server distros do not include a Graphical User Interface (GUI) by default. A GUI can take up system resources such as memory and processor, and often for a server-orientated operating system, thi...

read more

Curl For Pentesters by evilsaint

19 Apr 2022, 12:44 p.m.

Curl can be used for a number of useful activities during a pentest engagement. It can send HTTP Methods and data to an API endpoint, upload a file to a WebDav Server or grab server response headers, ...

read more

WebDAV works over HTTP and it has many benefits over transfer protocols such as FTP. These include strong encryption, robust authentication, proxy support, caching and multiple transfers through a sin...

read more

Dumping RDP Credentials For Logged In User...

read more

This article demonstrates how to fix the error "System has not been booted with systemd as init system (PID 1). Can't operate. Failed to connect to bus: Host is down" when using WSL version 2....

read more

This article looks at two ways of creating an SMB Server. First, we use the impacket library to spin up an SMB server from the command line and then we look at creating an SMB share manually on our Ka...

read more
SMB

Encoding PowerShell by evilsaint

19 Apr 2022, 12:14 p.m.

The use of the `-EncodedCommand` PowerShell parameter is typically used by Administrators to run complex scripts without having to worry about escaping characters. However, it is commonly used by adve...

read more

To exploit systems, attackers utilise a technique known as "enumeration" to find flaws that could lead to privilege escalation. Privilege Escalation is where a user can get elevated access to resource...

read more

This article demonstrates how to install the Metasploit Framework with Kali Linux on WSL2....

read more

This article serves as a quick reference for Windows Security Log event IDs....

read more