Nmap commands

TARGET SPECIFICATION: Can pass hostnames, IP addresses, networks, etc. Ex: scanme.nmap.org, microsoft.com/24,; 10.0.0-255.1-254 -iL <inputfilename>: Input from list of hosts/networks -iR <num hosts>: Choose random targets –exclude <host1[,host2][,host3],…>: Exclude hosts/networks –excludefile <exclude_file>: Exclude list from file   HOST DISCOVERY:

Read more

Pentesting Windows/Active Directory environments

CrackMapExec A swiss army knife for pentesting Windows/Active Directory environments CrackMapExec is your one-stop-shop for pentesting Windows/Active Directory environments! From enumerating logged on users and spidering SMB shares to executing psexec style attacks, auto-injecting Mimikatz/Shellcode/DLL’s into memory using Powershell, dumping

Read more

Cyber Attacks

A huge range of organisations and companies around the world have been affected by the WannaCry ransomware cyberattack, described by the EU’s law enforcement agency as “unprecedented”. From “cyberwar” to “hacktivism”, here are some of the major cyberattacks over the

Read more

Pin It on Pinterest