In this two-part post on AD Recon, we will review various tools that can be used to enumerate the NetBIOS (UDP port 137/138 | TCP port 139) and SMB (TCP port 445) services. To begin, we will learn about the NetBIOS and SMB services, how they tie together, as well as how they are useful for domain […] The post AD Recon – NetBIOS (137/138/139) and SMB (445) Part-1 first appeared on Juggernaut Pentesting Blog.| Juggernaut Pentesting Blog
Offensive security tools for 2025: Metasploit, Nuclei, Bloodhound & more. Uncover and remediate vulnerabilities before they’re exploited.| HackerTarget.com
What would it look like giving LLM's command line access to Nmap. Explore the possibilities in the security tools space.| HackerTarget.com
Die PHP-CGI-Schwachstelle CVE-2024-4577 ermöglicht RCE-Angriffe und eskaliert weltweit, dringende Sicherheitsmaßnahmen erforderlich.| Greenbone
Πριν από μερικές μέρες, για τις ανάγκες ενός project, κατέβασα την freeware εφαρμογή CPE17 Autorun Killer (AntiAutorun), η οποία έχει σκοπό της, την διαγραφή των ύποπτων “autorun.inf” α…| Ghost in the Lab
PentesterLab is an easy and great way to learn penetration testing. PentesterLab provides vulnerable systems that can be used to test and understand vulnerabilities.| Ghost in the Lab
Σε προηγούμενα άρθρα (1,2) καταφέραμε –σχετικά εύκολα– να ανακατευθύνουμε τη ροή του προγράμματος στο οποίο επιτεθήκαμε, με αποτέλεσμα να εκτελέσουμε επιτυχώς δικό μας κακόβουλο κώδικα …| Ghost in the Lab
Update: The module has been added to the Metasploit tree. Thanks to jduck for cleaning it up and generalizing it! View here; now just use svn update to get the module. — In my previous post…| my 20%
TLDR: Domain Users permitted to authenticate to Microsoft SQL databases can use the limited privileges they are granted to run a stored procedure. The stored procedure can be used to send the datab…| GrimBlog