Migrate active directory FSMO from windows server 2012 R2 to windows server 2016

Windows server 2016 was released for public (GA) on mid oct 2016. Its exciting time as businesses are already working…

Open source .NET deobfuscator and unpacker

de4dot is an open source (GPLv3) .NET deobfuscator and unpacker written in C#. It will try its best to restore…

Automatically extract obfuscated strings from malware

Rather than heavily protecting backdoors with hardcore packers, many malware authors evade heuristic detections by obfuscating only key portions of…

Install latest Wireshark on Debian

Add backports to your sources.list For jessie add this line: deb http://ftp.debian.org/debian jessie-backports main to your sources.list sudo apt-get update…

Passive information gathering

Search Engines Gather information using search engines results Google Bing Reverse IP lookup using Bing: IP:x.y.z.y Yahoo Social Networking Sites…

Exploit Database – a repository for exploits and PoCs

The Exploit Database is an archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and…

tmux – a terminal multiplexer

tmux is a terminal multiplexer. It enables a number of terminals to be created, accessed, and controlled from a single…

Debian – Awesome Zsh

Install zsh sudo apt-get install zsh Download prezto git clone –recursive https://github.com/sorin-ionescu/prezto.git ~/.zprezto Create symlinks setopt EXTENDED_GLOB; for rcfile in…

VLAN hopping

VLAN hopping VLAN hopping is a computer security exploit, a method of attacking networked resources on a virtual LAN. The…

Active Directory Security Hardening: Domain Admin Honeypot

Rename the account It’s a good idea to name the account like any other user account. That means giving it…

Next Page