PenTest-duck(Almost) All The Ways to File TransferOver 16 ways to leverage popular protocols (e.g. HTTP, FTP, TFTP, SMB) to file transfer to Windows and Linux targets12 min read·Oct 6, 2019--2--2
PenTest-duckOffensive Msfvenom: From Generating Shellcode to Creating TrojansChoose & configure payloads, generate shellcode, eliminate badchars, utilise encoders, reduce the shellcode length and create a Trojan!10 min read·Oct 4, 2019--1--1
PenTest-duckOffensive Nessus: Installation & Simple Windows Vulnerability ScanningInstalling Nessus Essentials, Setting up a Custom Scan Policy, Creating a New Scan and Generating a Report9 min read·Oct 4, 2019----
PenTest-duckBind vs Reverse vs Encrypted Shells — What Should You Use?What are the pros and cons of bind & reverse shells? Why are encrypted shells so secure? What tools are there to generate these shells?5 min read·Oct 2, 2019--1--1
PenTest-duckOffensive Netcat/Ncat: From Port Scanning To Bind Shell IP WhitelistingIn this post, we’ll be exploring Netcat’s limitless offensive potentials and a brief look at how Ncat takes Netcat to the next level7 min read·Oct 1, 2019----
PenTest-duckDeep Dive Into Nmap Scan TechniquesDisclaimer: I won’t be covering “every” scan type (e.g. -sY, -sM), but I’ll cover the scan types that I think will be used more often. A…6 min read·Sep 30, 2019----