admin

Netstat, ss, and ps

Monitoring Connections and Processes with Netstat, ss, and ps Why checking open ports and running processes matters during a pentest When you’re inside a compromised Linux system — whether through a reverse shell, a webshell, or full access — understanding what’s running and what it’s talking to is critical. This isn’t just “admin curiosity.” It’s […]

Netstat, ss, and ps Read More »

Windows Security Architecture Overview

1. Identification & Authentication Key Components: 2. Authorization Key Components: 3. Principals & Security Identifiers (SIDs) SIDs uniquely identify user, group, and computer accounts. Used throughout the OS for access control. Examples: 4. Privileges & User Rights Managed via: Examples: 5. File & Registry Security 6. Services & Session Security 7. Memory & Execution Protection

Windows Security Architecture Overview Read More »

PowerUp

PowerUp: Windows Privilege Escalation When you’re dropped into a Windows shell during an engagement, one of your top priorities is figuring out how to escalate privileges — ideally from a low-privileged user to SYSTEM. PowerUp, a PowerShell tool from the PowerSploit framework, was made for exactly this. In this post, we’ll walk through what PowerUp

PowerUp Read More »

SNMP versions explained

SNMP Versions Explained SNMP has three main versions: Version Security Level Description v1 🟥 Insecure Basic functionality, all data in plaintext, weak structure v2c 🟥 Insecure Improved performance over v1, but still plaintext, uses community strings v3 ✅ Secure Supports authentication, encryption, and user-based access SNMP v1 and v2c Community strings: String Access Type Default

SNMP versions explained Read More »

What is SNMP

What is SNMP? SNMP stands for Simple Network Management Protocol. It’s a protocol used to monitor and manage network devices like routers, switches, printers, servers, firewalls, etc. Think of SNMP as the “IT admin’s spyglass” — it gives visibility into what devices are doing, what their health is like, and even allows limited configuration —

What is SNMP Read More »

What is Docker

Docker for Pentesters: Part 1 As a penetration tester, you’re going to run into Docker. A lot. Whether it’s powering the web application you’re testing, hiding secrets in a containerized CI/CD pipeline, or quietly offering root access through a misconfigured socket — Docker is everywhere in modern infrastructure. So before we exploit it, let’s understand

What is Docker Read More »

Scroll to Top