by The Ethical Hacking Guru | Jan 9, 2021 | Blueteam, Redteam
The recent news about the SolarWinds hack that involves dozens of government agencies has brought new attention to attack against service accounts through Kerberos manipulation, known as Kerberoasting. Although this is not the only serious attack method against...
by The Ethical Hacking Guru | Jan 1, 2021 | Redteam
Sometimes to perform Windows Privilege Escalation you need to simply exploit the installed software. This is a common scenario for ethical hacking challenges. This tutorial will show you how to exploit remote connection managers, such as mRemoteNG. One of those...
by The Ethical Hacking Guru | Dec 9, 2020 | Become An Ethical Hacker, Redteam, SQLMap
While using SQLMap is not allowed on the OSCP exam, it is an ethical hacking standard and you should be very familiar with it. It is commonly used in interviews for junior penetration tester questions to weed out the wannabees. Enjoy this tutorial, how to use SQLMap...
by The Ethical Hacking Guru | Dec 1, 2020 | Become An Ethical Hacker, PowerShell Empire, Redteam
BC-Security now maintains a fork of the original, its new project is PowerShell Empire 3.0. In the online ethical hacking course Become An Ethical Hacker you will learn how to use PowerShell Empire 3.0 for Windows privilege escalation, and network penetration testing....
by The Ethical Hacking Guru | Nov 26, 2020 | Become An Ethical Hacker, Evil Winrm, Redteam
Windows has a feature named Windows remote management, otherwise known as WinRM. It uses the WS-Management protocol to allow administrators to run scripts remotely. For the ethical hacking lab we will enable this feature on the Windows 2019 server. I show you how to...
by The Ethical Hacking Guru | Nov 7, 2020 | Redteam
Any ethical hacker at one point comes across the Groups.xml file, a distant artifact of a less secure time in Windows history. They still exist out in the wild of course, but it is part of the essential ethical hacking education. In terms of what should you ask your...
by The Ethical Hacking Guru | Oct 31, 2020 | Metasploitable 2
Metasploitable 2 doesn’t come with the shellshock vulnerabillity. But that doesn’t mean we can’t put one there. This tutorial will show you how to exploit shellshock on Metasploitable 2 by Rapid7. What Is The Shellshock Vulnerability? Vulnerable...
by The Ethical Hacking Guru | Sep 12, 2020 | Vulnhub
In this vulnhub walkthrough you will learn how to complete the DMV:1 challenge. I have not figured out the significance of the name yet. There is usually a relation to the name of the box and something in or about the box. DMV: 1 Vulnhub WalkthroughMACHINE...
by The Ethical Hacking Guru | Sep 11, 2020 | Metasploit
Nothing is more annoying than not being able to add new exploits to Metasploit. So to help out I made this how to add exploits to Metasploit tutorial which is updated for msf5. There are many times where the ethical hacker needs to import an external exploit from a...