Uncategorized

SOCKS Proxy

Using SOCKS Proxy vs. Port Forwarding: A Pentester’s Guide When performing internal penetration testing, gaining a foothold is just the beginning. The next step is pivoting — finding a way to explore deeper into restricted networks. Two powerful techniques for this are SOCKS proxying and port forwarding. Both serve different purposes, and knowing when to […]

SOCKS Proxy Read More »

RPC

Port 135: The RPC Goldmine for Pentesters In many internal pentests, port 135 (MSRPC) is quietly open — sitting there like an unassuming door. But to those who understand it, that door leads to the inner workings of Windows systems. This post walks you through how to identify, enumerate, exploit, and abuse everything behind port

RPC Read More »

WinRM

Exploiting WinRM: A Guide for Pentesters Table of Contents 1. What is WinRM? Windows Remote Management (WinRM) is Microsoft’s implementation of the WS-Management protocol — a SOAP-based protocol used for remote management. It’s commonly used to run PowerShell commands or scripts remotely, making it a prime target for lateral movement. Think of it like SSH

WinRM Read More »

MSSQL

Exploiting MSSQL as a Pentester Overview Microsoft SQL Server (MSSQL) is a high-value target in many environments. It often runs with high privileges, contains sensitive data, and—if misconfigured—can lead to full system compromise. This guide walks you through everything you need to know about exploiting MSSQL from enumeration to post-exploitation. Scanning Start by identifying MSSQL

MSSQL Read More »

Evil-WinRM

What Is Evil-WinRM? Evil-WinRM (Evil Windows Remote Management) is a PowerShell Remoting shell that allows authenticated users to interact with a remote Windows machine over the WinRM protocol. Think of it like a remote PowerShell shell on steroids — fast, reliable, and custom-built for red team operations. When Should You Use Evil-WinRM? Use Evil-WinRM when:

Evil-WinRM Read More »

CrackMapExec

What is CrackMapExec? CrackMapExec, or CME, is a post-exploitation tool that lets you interact with SMB, WinRM, RDP, LDAP, and more, across large networks — all while managing and reusing credentials. Think of it as Metasploit’s quiet, more surgical cousin for internal Windows environments. It was built to help pentesters and red teamers enumerate, attack,

CrackMapExec Read More »

Scroll to Top