How to Phish Using a Jump Box Part 1

Installing Postfix First thing you need to do to get started is install postfix on your jump box. ⋊> /e/gophish sudo apt-get install postfix Once you have it installed you’ll need to configure the main.cf file. After making changes to your main.cf file make sure that the service actually runs. If you run the postfix service with sudo service postfix start do a quick netstat and see if you see port 25 open and listening.
Read more →

How to Use Silent Trinity - Bresaola 0.3.0dev

Overview ☔ Yea…..so apparently there is very little documentation for the current build of Silent Trinity. I was in the office today and saw my boy TheTalilama figuring it out so I decided to hop in and see how it worked. It actually does a great job against Windows 10 from what I have seen from just fooling around with it. Let’s get into how it works. Download Silent Trinity!
Read more →

Kiosk Escapes Pt 2 - Ft. Microsoft Edge!!

Backstory 📖 So…there was this one location in Vegas during Defcon 27 that had these pcs that could be used by the general public. Kiosks as some would say…Well I went over to them to see what all accessibility these kiosks had to offer out of general curiosity, you know, “can these let me access facebook, github, reddit” etc. type stuff. Well, to my astonishment these kiosks had an interface that wouldn’t allow me to access the C:\ drive!
Read more →

Installing Covenant v3.0 on Ubuntu 19

Intro There’s a lot of hype around the new version of Covenant 3.0 so I figured I’d share my installation experience with the world (I need content…shhhhh…lol). My boy Wraith said it was pretty legit so I had a quick look-see before hoping into bed. It def looks like a solid and modern framework that ups that ante for other C2 frameworks (you’ll never steal my heart from Koadic!❤).
Read more →

How I Use Koadic on Internals

Overview I LOVE KOADIC!! Yes this doesn’t work out of the box against Windows 10+ machines but if you find yourself on a network with older Windows 7 and Windows Server 2012 and below machines Koadic will gobble the network whole and very quickly. I guess I should note that much of what I love about it is it’s organization and implementation of Mimikatz which is probably the real MVP of the tool.
Read more →

What It’s Like Being a Pentester After OSCP

Job Hunting? Go Away….😤 So after you become an OSCP you expect jobs to just start raining on you after you stamp that OSCP in your resume and start sending it out. Yea….no. If you’re like me and all you have is OSCP and Hackthebox in terms of network security experience job hunting can be absolutely excruciating. The interviews process can make you feel like you know absolutely nothing; which is partially true if you were like me at the time.
Read more →

Windows 7 Kiosk Escape

body { text-align: justify} Backstory One day I was on site with client and was tasked with assessing an application for them. This was troubling for two reasons: 1.) This was my first on site assessment and 2.) due to the nature of the content I was tasked to work with, my little visit there required full supervision, which meant that my primary point of contact (POC) watched over my shoulder as I worked on this application for about 4 or so hours.
Read more →

LazySysAdmin Writeup

Intro I chose to do this write-up on LazySysAdmin because it is a good box for potential OSCP students to start out on and something that every OSCP pentester and every current OSCP (PWK) student that is ready to take the exam should be able to do without using a walk-through. This box should take 6 hours or less if you do not experience any hang ups or interruptions.
Read more →