You are here |
pentestlab.blog | ||
| | | |
taeluralexis.com
|
|
| | | | In this post, I will discuss my journey of obtaining the PNPT, a hands-on penetration testing exam from TCM Security. | |
| | | |
taeluralexis.com
|
|
| | | | We'll target a network comprising 3 machines, leveraging CVE exploits, pivoting, code obfuscation techniques, and AV bypass strategies. | |
| | | |
pentestarmoury.com
|
|
| | | | Introduction and Intent Since watching FireEye FLARE's 'WhyMI So Sexy?' at Derbycon last September, I have wanted to better understand WMI Events and apply them to offensive security operations. I saw the potential, but my comprehension was lacking and a comprehensive offensive WMI toolset did not exist. I was recently taken to school on WMI... | |
| | | |
soupdiva.net
|
|
| | Courtesy of my dear friend Jaime ?? |