what you don't know can hurt you
Showing 1 - 13 of 13 RSS Feed

Files from Jeenali Kothari

Email addressprivate
First Active2021-02-12
Last Active2021-05-06
View User Profile
Pass The Hash - Lateral Movement
Posted May 6, 2021
Authored by Jeenali Kothari | Site hackingarticles.in

This whitepaper discusses Pass The Hash attacks as well as the tooling needed to perform the attacks.

tags | paper
MD5 | 648083f837d1d468db9f436ed86a00d5
Kerberoasting Guide
Posted Apr 23, 2021
Authored by Jeenali Kothari | Site hackingarticles.in

This document covers all the basics of the Kerberoasting attack scenario.

tags | paper
MD5 | 5199b5287830740b414393f88088412c
Comprehensive Guide To FFUF
Posted Apr 23, 2021
Authored by Jeenali Kothari | Site hackingarticles.in

This documents discusses using the ffuf tool, which stands for Fuzz Faster U Fool.

tags | paper
MD5 | ec812c323692f9b5a1c3a2e91d9a9044
Comprehensive Guide On TShark
Posted Apr 23, 2021
Authored by Jeenali Kothari | Site hackingarticles.in

This document is a guide on how to use tshark effectively to monitor and analyze traffic.

tags | paper
MD5 | b40c4dfc24b53d2c919dd683e5071655
Wordlist Overview
Posted Apr 23, 2021
Authored by Jeenali Kothari | Site hackingarticles.in

This is a brief whitepaper that discusses wordlists, where to get them, and when to use them.

tags | paper
MD5 | fe2c4f9e82dec7e0f4c8b33e49d5612d
Credential Dumping Cheatsheet
Posted Mar 22, 2021
Authored by Jeenali Kothari | Site hackingarticles.in

Whitepaper called Credential Dumping Cheatsheet. It covers locations of data and various tooling you can use to find passwords.

tags | paper
MD5 | 23e7ebc003820d6a7825532027cba6c9
Privilege Escalation Automated Script Linux And Windows
Posted Mar 15, 2021
Authored by Jeenali Kothari | Site hackingarticles.in

This whitepaper acts as a cheatsheet for methodologies to apply with Linux and Windows privilege escalation.

tags | paper
systems | linux, windows
MD5 | f52f2b4ffa54c7f1bdea4d0eea2b224f
File Transfer Cheatsheet
Posted Mar 8, 2021
Authored by Jeenali Kothari | Site hackingarticles.in

This is a brief whitepaper that goes over file transfer mechanisms that can be used on Windows and Linux.

tags | paper
systems | linux, windows
MD5 | 1a613cf131ca43c9114b0a44d4a09e49
Autopsy Tool For Linux And Windows
Posted Feb 27, 2021
Authored by Jeenali Kothari | Site hackingarticles.in

This whitepaper provides an overview of Autopsy, the graphical interface for the Sleuthkit.

tags | paper
MD5 | 98254067e91d1e9b583b157a9d107bd4
Memory Forensics Using Volatility
Posted Feb 26, 2021
Authored by Jeenali Kothari | Site hackingarticles.in

This whitepaper is a guide to performing memory forensics using volatility. It goes into depth on using the Volatility framework to analyze memory dumped from a live system.

tags | paper
MD5 | a91356160da714ffe1abf4c470cad02e
Digital Forensics
Posted Feb 16, 2021
Authored by Jeenali Kothari | Site hackingarticles.in

This whitepaper is an introductory guide to Digital Forensics. It provides a high level understanding of protocol and roles.

tags | paper, protocol
MD5 | 4e90db017f230cd77eb0cba063d37ab8
Guide To FTK Imager
Posted Feb 15, 2021
Authored by Jeenali Kothari | Site hackingarticles.in

This whitepaper is a guide to using FTK Imager for digital forensics.

tags | paper
MD5 | e0ed582817040b408c863c6170fd0ee2
Port Forwarding And Tunnelling
Posted Feb 12, 2021
Authored by Jeenali Kothari | Site hackingarticles.in

This whitepaper is a cheatsheet that goes over various methods of port forwarding and tunnelling of traffic.

tags | paper
MD5 | 2c5dc5ee3665fdf16ae57eab041dab65
Page 1 of 1
Back1Next

File Archive:

June 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    35 Files
  • 2
    Jun 2nd
    14 Files
  • 3
    Jun 3rd
    40 Files
  • 4
    Jun 4th
    22 Files
  • 5
    Jun 5th
    1 Files
  • 6
    Jun 6th
    1 Files
  • 7
    Jun 7th
    19 Files
  • 8
    Jun 8th
    14 Files
  • 9
    Jun 9th
    39 Files
  • 10
    Jun 10th
    20 Files
  • 11
    Jun 11th
    22 Files
  • 12
    Jun 12th
    2 Files
  • 13
    Jun 13th
    1 Files
  • 14
    Jun 14th
    32 Files
  • 15
    Jun 15th
    34 Files
  • 16
    Jun 16th
    9 Files
  • 17
    Jun 17th
    33 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close