Exploitation Links Feb 2018

sleep 0 0

https://www.google.com/search?q=dark+caracal&rlz=1C1CHFX_en__601__688&oq=dark+caracal&aqs=chrome..69i57j0l5.2901j0j7&sourceid=chrome&ie=UTF-8

https://www.youtube.com/watch?v=qrwVS7poNkQ

https://www.youtube.com/watch?v=Zu8SixuIMww

https://medium.com/@joe_norton/enumeration-and-attacking-through-a-firewall-with-metasploit-and-proxychains-656c296d24f9

https://andreafortuna.org/cybersecurity/metasploit-console-my-own-cheatsheet/

https://www.blackhillsinfosec.com/use-nmap-meterpreter/

http://www.gokhangormus.com/2012/06/meterpreterpivoting-ile-erisilemeyen.html

http://blog.knapsy.com/blog/2014/11/05/kvasir-vm-writeup/

https://www.google.com/search?rlz=1C1CHFX_en__601__688&ei=f0J8WqePD5DvgAae_rvgDA&q=%22Starting+the+socks4a+proxy+server%22+%22Stopping+the+socks4a+proxy+server%22&oq=%22Starting+the+socks4a+proxy+server%22+%22Stopping+the+socks4a+proxy+server%22&gs_l=psy-ab.3...1049.8533.0.8739.15.15.0.0.0.0.125.1169.11j3.14.0....0...1c.1.64.psy-ab..2.0.0....0.lTbe-TOQ6vU solution is to change port

https://www.offensive-security.com/metasploit-unleashed/proxytunnels/

https://netsec.ws/?p=331

https://github.com/rapid7/metasploit-framework/wiki/How-to-use-a-reverse-shell-in-Metasploit

https://www.offensive-security.com/metasploit-unleashed/portfwd/

https://web.archive.org/web/20170117115752/https://null-byte.wonderhowto.com/how-to/hack-like-pro-evade-detection-using-proxychains-0154619/

https://www.cobaltstrike.com/help-socks-proxy-pivoting

https://0x00sec.org/t/a-brief-introduction-to-proxychains/418

https://blog.cobaltstrike.com/2015/04/08/cobalt-strike-2-4-a-pittance-for-post-exploitation/

Elevate Kit https://www.youtube.com/watch?v=sNKQVchyHDI

https://github.com/rsmudge/ElevateKit

https://www.cobaltstrike.com/help-elevate

https://blog.cobaltstrike.com/2016/01/13/real-time-feed-of-red-team-activity/

https://www.cobaltstrike.com/aggressor-script/index.html

https://www.cobaltstrike.com/help-install

https://www.cobaltstrike.com/help-setup-collaboration