Posts for: #Tools

BloodHound

SharpHound collects Active Directory data, mapping relationships and permissions, while BloodHound analyzes this data to reveal attack paths and privilege escalation opportunities. Both tools are widely used in pentesting to identify weaknesses in AD environments.

[Read more]

Chisel Forwarding

This guide provides step-by-step instructions on how to set up and use Chisel for tunneling traffic and accessing remote services. It also covers how to configure proxychains to route traffic through the tunnel.

[Read more]

Nmap Scanning

Nmap is a versatile tool used for network discovery, scanning, and security auditing. It allows you to combine multiple options in a single command to perform various tasks efficiently. Below is a compact guide to the most commonly used Nmap arguments.

[Read more]

SSH X11 Forwarding

X11 forwarding allows you to securely run graphical applications on a server and have the graphical output displayed on your local machine (client). This is particularly useful when you need to run GUI-based applications on a server or remote machine but want to interact with them using your local graphical environment.

[Read more]

SSH Invalid PublicKey

SSH, or Secure Shell, is a widely used protocol for secure remote access to systems. However, when attempting to connect to a server using SSH, you may encounter a “permission denied (publickey)” error. This guide will help you troubleshoot and resolve this issue.

[Read more]

SSH Tunneling

SSH tunneling is a technique used to enhance security by establishing encrypted connections between local and remote systems, facilitating secure data transfer and access to remote resources. There are several types of SSH tunneling, each serving different purposes:

[Read more]