DefCon25: Win7 x64 & Win10RS1/2 x64 UAC 0day
Lab Setup x2 VM’s => Win7 x64 & Win10RS1/2 x64 Extract “DefCon-Tool.zip” to the root of the C drive Follow slides and Lab-Writeup.txt Download
Network PenTest / Post Exploitation
by do son · Published August 5, 2017 · Last modified November 4, 2024
Lab Setup x2 VM’s => Win7 x64 & Win10RS1/2 x64 Extract “DefCon-Tool.zip” to the root of the C drive Follow slides and Lab-Writeup.txt Download
Forensics / Network PenTest / Sniffing & Spoofing / Wireless
by do son · Published July 8, 2017 · Last modified November 4, 2024
Chellam is a Wi-Fi IDS/Firewall for Windows. Chellam can detect Wi-Fi attacks, such as Honeypots, Evil Twins, Mis-association, and Hosted Network based backdoors etc., against a Windows-based client without the...
You can use the powercfg.exe tool to control power schemes (also named power plans) to use the available sleep states, to control the power states of individual devices, and to...
Network PenTest / Post Exploitation
by do son · Published May 4, 2017 · Last modified January 27, 2018
Hi, here is my first post. I want to list some great Windows command Enable RDP reg add “hklm\system\currentcontrolset\control\terminal server” /f /v fDenyTSConnections /t REG_DWORD /d 0 netsh firewall set...
Exploitation / Metasploit / Network PenTest
by do son · Published April 25, 2017 · Last modified November 4, 2024
Shadow Brokers shocked the world once again leaked a confidential document, which contains a number of beautifully Windows remote exploits that can cover a large number of Windows servers, Windows...
In this tutorial we will walk together step by step into Creating a dual boot of Kali-Linux & Windows 7. I Do not take credit for this post. So ,...