SMB

Accessing Windows Systems Remotely From Linux

Accessing Windows Systems Remotely From Linux logo

This page contains a collection of methods for connecting to a remote Windows system from Linux and examples of how to execute commands on Windows machines remotely from Linux using number of different tools. It covers over 30 different methods for obtaining remote shell, remote command execution or connecting to a remote desktop using variety

Accessing Windows Systems Remotely From Linux Read More »

PowerShell Commands for Pentesters

PowerShell commands for pentesters logo

This article contains a list of PowerShell commands collected from various corners of the Internet which could be helpful during penetration tests or red team exercises. The list includes various post-exploitation one-liners in pure PowerShell without requiring any offensive (= potentially flagged as malicious) 3rd party modules, but also a bunch of handy administrative commands.

PowerShell Commands for Pentesters Read More »

RCE on Windows from Linux Part 5: Metasploit Framework

RCE on Windows from Linux using Metasploit logo

In this post we will be detailing RCE capabilities of the Metasploit Framework (MSF) – the world’s most popular penetration testing framework. This is the 5th part of the blog post series focused on tools capable of authenticated remote command execution (RCE) on Windows machines from Linux (Kali). Introduction As mentioned in the previous parts

RCE on Windows from Linux Part 5: Metasploit Framework Read More »

Top 10 Vulnerabilities: Internal Infrastructure Pentest

Top 10 vulnerabilities found during internal network penetration tests logo

Have you ever wondered what are the most common vulnerabilities found during penetration tests? What are some of the typical security problems of corporate networks? In this article we will be going through the Top 10 list of the most reported vulnerabilities during internal infrastructure penetration tests. Disclaimer The following information was compiled from more

Top 10 Vulnerabilities: Internal Infrastructure Pentest Read More »