Are you running gophish straight from shell and want to make sure to not close the application by mistake during a phishing assessment? Or maybe that was what led you to this article? No worries, in this article I will show you how easy it is to run it as a service with systemd instead. […] The post How to run Gophish as a systemd service first appeared on TzuSec.com.| TzuSec.com
Today I want to show you a demo that I recorded on how you can use the amazing tool Evilginx2 (by Kuba Gretzky) to bypass Multi-Factor Authentication (MFA). In the demo I used Evilginx on a live Microsoft 365/Office 365 environment but It can be used on almost any site that doesn’t use a more […] The post how to use Evilginx2 to grab session tokens and bypass Multi-factor authentication first appeared on TzuSec.com.| TzuSec.com
This guide will show you how you can launch cmd and Powershell with help from Microsoft Paint. Sometimes organisations environments are being locked down and are preventing users from right clicking and opening tools such as cmd.exe or powershell.exe. When I face that during a penetration test I usually try this simple mspaint hack to […] The post How to launch Command Prompt and powershell from MS Paint first appeared on TzuSec.com.| TzuSec.com
This quick guide will show you a simple way of downloading files with certutil.exe. It’s pretty handy to use when other tools for downloading files (for example powershell) are disabled. Since certutil.exe is a built-in windows tool it normally isn’t blocked. The command you want to run to download a file: Explanation of the parameters: […] The post How to download files with Certutil.exe first appeared on TzuSec.com.| TzuSec.com
What is DKIM? DKIM stands for DomainKeys Identified Mail and is an email autentication method. It helps the receiving mail server to verify whether an email have been sent from an allowed email server or not. The idea of DKIM is that the senders email servers are signing all outgoing messages with asymmetric encryption. The […] The post What is DKIM and how do you enable IT in Microsoft 365? first appeared on TzuSec.com.| TzuSec.com
What is SPF? SPF stands for Sender Policy Framework and is an email autentication method. It helps the receiving mail server to verify whether an email have been sent from an allowed email server or not. Your SPF policy is set up by publishing it in the form of a TXT record in your DNS. […] The post What is SPF and how do you configure it? first appeared on TzuSec.com.| TzuSec.com
This guide will help you prepare your CentOS 7 server for a migration from on-premise to Microsoft Azure cloud. It can be a bit tricky to get everything to work correctly and personally I didn’t find Microsofts guides to be great so I write this post to help you with the steps that is needed […] The post How to prepare your CentOS 7 machine to Microsoft Azure first appeared on TzuSec.com.| TzuSec.com
This guide will help you prepare your CentOS 6 server for a migration from on-premise to Microsoft Azure cloud. It can be a bit tricky to get everything to work correctly and personally I didn’t find Microsofts guides to be great so I write this post to help you with the steps that is needed […] The post How to prepare your CentOS 6 machine to Microsoft Azure first appeared on TzuSec.com.| TzuSec.com
What is Hydra: Hydra is a classic, fast network logon cracker that was created by Van Hauser. It is commonly used as a network logon cracker. The tool is great since it’s both fast and have built-in support for many different protocols. You can find the code at: https://github.com/vanhauser-thc/thc-hydra How to install Hydra: Hydra comes […] The post Brute Forcing With Hydra first appeared on TzuSec.com.| TzuSec.com
Terraform is an open-source software tool for Infrastructure as Code (IaC). The tool helps users to define and provision a cloud infrastructure with code. This guide will guide you on how to install Terraform on Linux. You can either install Terraform from pre-compiled binary or you can also compile it from source and that this […] The post How to Install Terraform in Linux first appeared on TzuSec.com.| TzuSec.com