A common thing to do during post exploitation is to
Continue readingUsing Powershell for File Integrity
Powershell uses the Get-FileHash cmdlet to generate a unique hash
Continue readingSending Email with PowerShell
Largely taken from here and here, the following example shows
Continue readingCritical Security Control One (CSC 1) – Inventory of Authorized and Unauthorized Devices
I created a poor man’s solution to CSC 1 by writing
Continue readingPython PDF Merger
This post is to show how Python can be used
Continue readingSending Email with Python
This post is a simple example of sending email with
Continue readingAutomated OS Injection Reverse Shell with Mechanize Against DVWA
Damn Vulnerable Web Application (DVWA) is an intentionally vulnerable web
Continue readingStored Cross-site Scripting (XSS) Cookie Stealing with Mechanize and DVWA
Damn Vulnerable Web Application (DVWA) is an intentionally vulnerable web
Continue readingMetasploit VB Macro Payload for Office Documents
This post is about using a metasploit generated payload to
Continue readingBurp Suite Professional – handshake alert: unrecognized_name
I’ve received this error several times now, so I am
Continue reading