PenTest-duck(Almost) All The Ways to File TransferOver 16 ways to leverage popular protocols (e.g. HTTP, FTP, TFTP, SMB) to file transfer to Windows and Linux targetsOct 6, 20192Oct 6, 20192
PenTest-duckOffensive Msfvenom: From Generating Shellcode to Creating TrojansChoose & configure payloads, generate shellcode, eliminate badchars, utilise encoders, reduce the shellcode length and create a Trojan!Oct 4, 20191Oct 4, 20191
PenTest-duckOffensive Nessus: Installation & Simple Windows Vulnerability ScanningInstalling Nessus Essentials, Setting up a Custom Scan Policy, Creating a New Scan and Generating a ReportOct 4, 2019Oct 4, 2019
PenTest-duckBind vs Reverse vs Encrypted Shells — What Should You Use?What are the pros and cons of bind & reverse shells? Why are encrypted shells so secure? What tools are there to generate these shells?Oct 2, 20191Oct 2, 20191
PenTest-duckOffensive Netcat/Ncat: From Port Scanning To Bind Shell IP WhitelistingIn this post, we’ll be exploring Netcat’s limitless offensive potentials and a brief look at how Ncat takes Netcat to the next levelOct 1, 2019Oct 1, 2019
PenTest-duckDeep Dive Into Nmap Scan TechniquesDisclaimer: I won’t be covering “every” scan type (e.g. -sY, -sM), but I’ll cover the scan types that I think will be used more often. A…Sep 30, 2019Sep 30, 2019