by The Ethical Hacking Guru | Jul 5, 2021 | Vulnhub
This is a walkthrough for the VulnCMS:1 vulnhub machine. If you are looking for OSCP-like vulnhub boxes to practice with then look no further. Really if you want to prepare for the OSCP then you should consider subscribing to the Ethical Hacking Guru Academy. Want to...
by The Ethical Hacking Guru | Apr 17, 2021 | Uncategorized
You can use a free online resource to crack hashes with hashcat, without having to break the bank for an overpriced graphics card these days. It’s called Colabcat and using colabcat is a free easy way to crack passwords online. If you are a complete beginner to...
by The Ethical Hacking Guru | Mar 5, 2021 | C#, ConfuserEx, Redteam
In this tutorial, I cover how to use ConfuserEx and neo-ConfuserEx to bypass antivirus. It’s worth mentioning that ConfuserEx only obfuscates .NET assemblies (compiled C# programs). I will use ConfuserEx to obfuscate a compiled version of the SafetyKatz project....
by The Ethical Hacking Guru | Mar 4, 2021 | C#, Go
I played around with using csc /out:outfile.exe program.cs but the thing is you can use an executable or a DLL just the same using the Assembly.Load() method which comes with the System.Inflection namespace. This method does the following – Loads an assembly....
by The Ethical Hacking Guru | Feb 20, 2021 | Go, Redteam
Go can be used by ethical hackers to run shellcode generated by Metasploit. That means you can use msfvenom to create shellcode that can be used by a go program to execute it. For this tutorial, I am using this project go-shellcode by brimstone on Github. First make...
by The Ethical Hacking Guru | Feb 20, 2021 | Go, Redteam
Go is a popular tool for offensive programming these days. The antivirus vendors are still catching up to it since it is still a niche tool for ethical hacking purposes. In this tutorial you will learn how to write a Go program to open a new Notepad process. You will...
by The Ethical Hacking Guru | Feb 14, 2021 | Redteam
Network File System (NFS) shares are the Linux version of Windows SMB shares. These are used for Unix-based machines to share files with each other. Mounting an NFS share allows the remote client to view the files as if they were viewing them locally on the same...
by The Ethical Hacking Guru | Feb 13, 2021 | Go
An application should be easy to use. You’ve heard it before, about the legacy app that was migrated, and now the guy who managed it is no longer around. No one knows how it works. This is how I use Cobra for easy Golang cli flags for all my apps that need it....
by The Ethical Hacking Guru | Feb 10, 2021 | Crackmapexec, Redteam
By default wdigest is disabled on Windows 10, but not removed. You can enable it with a registry change. This is a short and sweet tutorial on how to dump Windows passwords by exploiting wdigest in a wdigest downgrade attack. I demonstrate how to exploit the...
by The Ethical Hacking Guru | Jan 9, 2021 | Blueteam, Redteam
Like Kerberoasting, ASREPRoasting is an attack that ends with offline cracking of an encrypted password hash for an account in an Active Directory domain. All it takes is an account with DONT_REQ_PREAUTH enabled. From Microsoft, the definition of this setting:...