PinnedConquering Active Directory for OSCP+: Essential Techniques and Strategies — Part 1This is the first of a series of short articles written to assist with the Active Directory (AD) portion of the new OSCP+ exam format. The…Oct 22, 2024Oct 22, 2024
Own the OSCP AD set with these 4 simple stepsThe OSCP Active Directory section feels easier now without the need for an initial foothold. However, even in an “assumed breach” scenario…4d ago4d ago
Basic AV evasion and detectionFor the OSCP exam, AV evasion is rarely a concern. While the topic is covered in the course, it’s primarily tested in the PEN-300 exam…6d ago6d ago
PowerShell History: A Critical Step in Windows Post-ExploitationSometimes the easiest step is the one that provides the more “bang for your bucks”. The de-facto enumeration tool (Windows and Linux) is…Feb 17Feb 17
Automating OSCP exam Insights with OpenAIThe idea for this AI project came to me after seeing so many “I passed OSCP” Reddit posts. So, I decided to collect all data and let OpenAI…Feb 15Feb 15
Feroxbuster Took Down the Webserver!Feroxbuster is one of my favorite tools for directory brute-forcing. It’s blazing fast, efficient, and an absolute beast for uncovering…Feb 13Feb 13
SeImpersonate on old Windows BoxesIf you’re like me, when I’m working on a Windows box trying to elevate my privileges and I see “SeImpersonate,” I feel like I just won the…Feb 8Feb 8
PenTestMonkey & Ivan Sincek Shells Failing? Use This PHP Reverse ShellYou managed to find a LFI or a way to upload a php malicious file via ftp. You are very excited because you are about to get a foothold…Feb 81Feb 81
RDP File Transfers to Kali — No Clipboard, No Hassle!If you gain access via RDP, transferring files is a breeze using the copy command or simply dragging and dropping in File Explorer. The…Feb 51Feb 51