Real Name | David J. Dodd |
---|---|
Email address | private |
Website | pbnetworks.net |
First Active | 2011-06-25 |
Last Active | 2014-01-03 |
This is a brief whitepaper that discusses shell access on both Windows and Unix systems and how to obtain better control versus arbitrary command execution.
cb59a18f0938580f2565d5dbb95ef2e78886586329dfef334a80e2e3a2b58d8e
This brief article attempts to give some detail into how to search through packet dump files or pcap files using Wireshark.
c44f2334bb819f2dfbedcbe22c2013c13b3f3857931cd7b1b640a2ca0649e5f5
This paper demonstrates how to ARP poison a connection between Windows 7 and Windows 2008 R2 Server using Cain.
a751245239f622e54ca2416bab2aef9e2485eae6f6c4782fd8b7a36a98c54142
This whitepaper touches on various scanning tools and how to use them. It gives an overview of hping, scapy, unicornscan, nmap, and nessus.
b9b96dce3e65312296a5f09fbf2af8bba0ae3fa3b7a663daab2a541d4ede75d1
Whitepaper called Using Metasploit With Nessus Bridge On Ubuntu. The author discusses using the autopwn feature in Metasploit, running Nessus from within Metasploit, choices of databases to use, and the benefits of each.
7a281ad62c6b8aa703ecc0bdd4a00e7157e35b1a5e19f99ed374027c1a923e86
Whitepaper called Post Exploitation using Metasploit pivot and port forward. A very nice feature in Metasploit is the ability to pivot through a meterpreter session to the network on the other side. This tutorial walks you through how this is done once you have a meterpreter session on a foreign box.
a05be3bd008961eca995330559a8b1aed77254c9151b49ae3060c36de9ee2372