Explore >> Select a destination


You are here

evilsaint.com
| | taeluralexis.com
50.0 parsecs away

Travel
| | We'll target a network comprising 3 machines, leveraging CVE exploits, pivoting, code obfuscation techniques, and AV bypass strategies.
| | www.justus.pw
50.0 parsecs away

Travel
| | [AI summary] The user successfully gained access to a system by exploiting a Heartbleed vulnerability, decrypted an RSA key using a password obtained from memory, and then used that key to log in as the 'hype' user. After enumerating the system, they accessed a Tmux session to gain root access and retrieved the root flag.
| | pentestlab.blog
55.6 parsecs away

Travel
| | Windows File Explorer is the is the graphical file management utility for the Windows operating system and the default desktop environment. Windows explorer was introduced in Windows 95 and it is associated with the process explorer.exe. Since this is a native Windows process it could be used in red team operations for injection of arbitrary...
| | wiki.samba.org
87.8 parsecs away

Travel
| [AI summary] This article serves as a step-by-step technical guide for configuring and setting up Samba Server to function as an Active Directory Domain Controller on Unix/Linux systems, covering installation, provisioning, and verification.