O
O
OSCP Notes
Search
⌃K
Introduction
Port scanning
Passive Information Gathering
Ports enum:
Recon Tools
Tech Skills Needed
msfvenom
meterpreter commands
Web Apps
python scripts
Windows hacks
Port Forwarding
Reverse shells
Binary exploitation
Transfering Modules
Buffer Overflow
Cracking!
shellshock
Active Directory
Antivirus Evasion
Windows Priv Esc
Linux Priv Esc
Active Directory Case Studies
Pivoting
C program analysis
Misc
Steg
Memory Dump
Oracle exploitation:
Notes
default credentials
New Empire!
Scripts I built
Got creds? do this
How to add path variables
Good Passwords & Username file locations on kali
fcrackzip (crack common zip pass)
Extracting file from the target and analyze it with ltrace
Hack the box Write-ups
THM Offensive Security Path
Proving Ground
Cyber Sec Labs
Powered By GitBook

Got creds? do this

use impacket's "psexec.py"
psexec.py pentest:'P3nT3st!'@10.10.10.152
this will let you get a shell.
Previous
Scripts I built
Next
How to add path variables
Last modified 1yr ago
Copy link