Exploitation Links Feb 2018
sleep 0 0
https://www.google.com/search?q=dark+caracal&rlz=1C1CHFX_en__601__688&oq=dark+caracal&aqs=chrome..69i57j0l5.2901j0j7&sourceid=chrome&ie=UTF-8
https://www.youtube.com/watch?v=qrwVS7poNkQ
https://www.youtube.com/watch?v=Zu8SixuIMww
https://medium.com/@joe_norton/enumeration-and-attacking-through-a-firewall-with-metasploit-and-proxychains-656c296d24f9
https://andreafortuna.org/cybersecurity/metasploit-console-my-own-cheatsheet/
https://www.blackhillsinfosec.com/use-nmap-meterpreter/
http://www.gokhangormus.com/2012/06/meterpreterpivoting-ile-erisilemeyen.html
http://blog.knapsy.com/blog/2014/11/05/kvasir-vm-writeup/
https://www.google.com/search?rlz=1C1CHFX_en__601__688&ei=f0J8WqePD5DvgAae_rvgDA&q=%22Starting+the+socks4a+proxy+server%22+%22Stopping+the+socks4a+proxy+server%22&oq=%22Starting+the+socks4a+proxy+server%22+%22Stopping+the+socks4a+proxy+server%22&gs_l=psy-ab.3...1049.8533.0.8739.15.15.0.0.0.0.125.1169.11j3.14.0....0...1c.1.64.psy-ab..2.0.0....0.lTbe-TOQ6vU solution is to change port
https://www.offensive-security.com/metasploit-unleashed/proxytunnels/
https://netsec.ws/?p=331
https://github.com/rapid7/metasploit-framework/wiki/How-to-use-a-reverse-shell-in-Metasploit
https://www.offensive-security.com/metasploit-unleashed/portfwd/
https://web.archive.org/web/20170117115752/https://null-byte.wonderhowto.com/how-to/hack-like-pro-evade-detection-using-proxychains-0154619/
https://www.cobaltstrike.com/help-socks-proxy-pivoting
https://0x00sec.org/t/a-brief-introduction-to-proxychains/418
https://blog.cobaltstrike.com/2015/04/08/cobalt-strike-2-4-a-pittance-for-post-exploitation/
Elevate Kit https://www.youtube.com/watch?v=sNKQVchyHDI
https://github.com/rsmudge/ElevateKit
https://www.cobaltstrike.com/help-elevate
https://blog.cobaltstrike.com/2016/01/13/real-time-feed-of-red-team-activity/
https://www.cobaltstrike.com/aggressor-script/index.html
https://www.cobaltstrike.com/help-install
https://www.cobaltstrike.com/help-setup-collaboration
https://www.google.com/search?q=dark+caracal&rlz=1C1CHFX_en__601__688&oq=dark+caracal&aqs=chrome..69i57j0l5.2901j0j7&sourceid=chrome&ie=UTF-8
https://www.youtube.com/watch?v=qrwVS7poNkQ
https://www.youtube.com/watch?v=Zu8SixuIMww
https://medium.com/@joe_norton/enumeration-and-attacking-through-a-firewall-with-metasploit-and-proxychains-656c296d24f9
https://andreafortuna.org/cybersecurity/metasploit-console-my-own-cheatsheet/
https://www.blackhillsinfosec.com/use-nmap-meterpreter/
http://www.gokhangormus.com/2012/06/meterpreterpivoting-ile-erisilemeyen.html
http://blog.knapsy.com/blog/2014/11/05/kvasir-vm-writeup/
https://www.google.com/search?rlz=1C1CHFX_en__601__688&ei=f0J8WqePD5DvgAae_rvgDA&q=%22Starting+the+socks4a+proxy+server%22+%22Stopping+the+socks4a+proxy+server%22&oq=%22Starting+the+socks4a+proxy+server%22+%22Stopping+the+socks4a+proxy+server%22&gs_l=psy-ab.3...1049.8533.0.8739.15.15.0.0.0.0.125.1169.11j3.14.0....0...1c.1.64.psy-ab..2.0.0....0.lTbe-TOQ6vU solution is to change port
https://www.offensive-security.com/metasploit-unleashed/proxytunnels/
https://netsec.ws/?p=331
https://github.com/rapid7/metasploit-framework/wiki/How-to-use-a-reverse-shell-in-Metasploit
https://www.offensive-security.com/metasploit-unleashed/portfwd/
https://web.archive.org/web/20170117115752/https://null-byte.wonderhowto.com/how-to/hack-like-pro-evade-detection-using-proxychains-0154619/
https://www.cobaltstrike.com/help-socks-proxy-pivoting
https://0x00sec.org/t/a-brief-introduction-to-proxychains/418
https://blog.cobaltstrike.com/2015/04/08/cobalt-strike-2-4-a-pittance-for-post-exploitation/
Elevate Kit https://www.youtube.com/watch?v=sNKQVchyHDI
https://github.com/rsmudge/ElevateKit
https://www.cobaltstrike.com/help-elevate
https://blog.cobaltstrike.com/2016/01/13/real-time-feed-of-red-team-activity/
https://www.cobaltstrike.com/aggressor-script/index.html
https://www.cobaltstrike.com/help-install
https://www.cobaltstrike.com/help-setup-collaboration