SharpHound collects Active Directory data, mapping relationships and permissions, while BloodHound analyzes this data to reveal attack paths and privilege escalation opportunities. Both tools are widely used in pentesting to identify weaknesses in AD environments.
Posts for: #Tools
Chisel Forwarding
This guide provides step-by-step instructions on how to set up and use Chisel for tunneling traffic and accessing remote services. It also covers how to configure proxychains to route traffic through the tunnel.
Nmap Scanning
Nmap is a versatile tool used for network discovery, scanning, and security auditing. It allows you to combine multiple options in a single command to perform various tasks efficiently. Below is a compact guide to the most commonly used Nmap arguments.
SSH X11 Forwarding
X11 forwarding allows you to securely run graphical applications on a server and have the graphical output displayed on your local machine (client). This is particularly useful when you need to run GUI-based applications on a server or remote machine but want to interact with them using your local graphical environment.
SSH Invalid PublicKey
SSH, or Secure Shell, is a widely used protocol for secure remote access to systems. However, when attempting to connect to a server using SSH, you may encounter a “permission denied (publickey)” error. This guide will help you troubleshoot and resolve this issue.
SSH Tunneling
SSH tunneling is a technique used to enhance security by establishing encrypted connections between local and remote systems, facilitating secure data transfer and access to remote resources. There are several types of SSH tunneling, each serving different purposes:
SSH Key Authentication
enhances security using cryptographic keys instead of passwords for accessing remote systems, ensuring a more secure and efficient login process.