Skip to content

Techno Herder

Knowledge Base for Penetration Testing

  • Home
  • TechnoHerder
  • Page 3

Categories

  • *nix-Based Attack (2)
  • Active Directory (1)
  • Active Reconnaissance (6)
  • Anti-Forensic Techniques (1)
  • Attack (6)
  • Blue Team (16)
  • Cloud (1)
  • Code Fortification (5)
  • Cryptography (1)
  • Customer Facing (1)
  • Database (4)
  • Hacking 101 (44)
  • Lateral Movement (1)
  • MacOS (1)
  • Mobile Penetration Testing (11)
  • Network Attack (26)
  • Network Scan & Map (4)
  • OSINT (4)
  • Pen Test Reporting (4)
  • Pentest (11)
  • Persistence Techniques (1)
  • Physical Security (1)
  • Post-Exploitation (5)
  • Reverse Engineering (3)
  • Social Engineering (3)
  • Tools (16)
  • Uncategorized (0)
  • Vulnerability Scanning (3)
  • Web App Attack (13)
  • Windows Attack (17)
  • Wireless & RF-based Attacks (3)

Author: TechnoHerder

Blue Team Code Fortification Hacking 101

HTTPS on Kubernetes with Spring Boot, Istio and Cert Manager

by TechnoHerder December 5, 2022January 2, 2023 Leave a comment

In this article, you will learn how to create secure HTTPS gateways on Kubernetes. We will use Cert Manager to generate TLS/SSL certificates. With Istio we can create secure HTTPS gateways and expose them outside a Kubernetes cluster. Our test application is built on top of Spring Boot. We will consider two different ways of […]

Windows Attack

Windows File Transfers For Hackers

by TechnoHerder December 4, 2022September 24, 2023 Leave a comment

For this post, we will be deep-diving into the art of transferring files. We will go over various techniques on how to transfer files from our attacker machine onto a victim Windows 10 host (download), as well as from the victim Windows 10 host back onto our attacker machine (upload). As hackers, we constantly find […]

Hacking 101 Network Attack Windows Attack

AS-REP Roasting

by TechnoHerder December 4, 2022January 17, 2023 Leave a comment

In this blog post we will look at how to perform AS-REP roasting in two different ways, how to use hashcat to crack a krbasrep5 hashes, and how to mitigate this type of attack. During kerberos pre-authentication, a user’s NTID is used to encrypt a timestamp and then the domain controller will attempt to decrypt […]

Network Attack Windows Attack

Lateral Movement – Pass-the-Hash Attacks

by TechnoHerder December 4, 2022January 17, 2023 1 Comment

In this post we will take a look A LOT of tools and techniques that can be used to perform a pass-the-hash attack. First, we will dump the local SAM file hashes off our initial victim and extract the local administrator account’s hash. From there, we will use the local administrator hash to move laterally […]

Hacking 101 Post-Exploitation Windows Attack

Proving Grounds – Hutch

by TechnoHerder December 4, 2022January 2, 2023 Leave a comment

In this Walkthrough, we will be hacking the machine Hutch from Proving Grounds Practice. To begin, we will utilize the ability to perform an anonymous LDAP search to dump account information where we will find a password. With valid credentials, we will run Bloodhound remotely to query the DC and find that our user has […]

Hacking 101

How To Add A User to Sudoers On CentOS 8

by TechnoHerder December 3, 2022January 2, 2023 Leave a comment

In today’s tutorial, we are going to focus on adding a user to sudoers on the most recent CentOS distribution : CentOS 8. The sudo command is one of the most popular command available on Linux. It allows users to perform commands as another user, which is configured by default to run as the root […]

Blue Team Hacking 101

How To Add a User to Sudoers On Debian 10 Buster

by TechnoHerder December 3, 2022January 17, 2023 Leave a comment

In today’s tutorial, we are going to see how you can add a user to sudoers on Debian distributions. The sudo command allows authorized users to perform commands as another user, which is by default the root user. There are two ways to add a user to sudoers : you can add this user to […]

Blue Team Hacking 101

How To Setup OpenLDAP Server on Debian 10

by TechnoHerder December 3, 2022January 17, 2023 Leave a comment

As a system administrator, you are probably already familiar with the LDAP protocol. If you are working in a medium to large company, you can be sure that your company already owns a LDAP server, whether it is on Linux or Windows. Invented in the early 80s, the LDAP protocol (for Lightweight Directory Access Protocol) […]

Active Directory Hacking 101 Windows Attack

How To Search LDAP using ldapsearch (With Examples)

by TechnoHerder December 3, 2022April 2, 2023 Leave a comment

If you are working in a medium to large company, you are probably interacting on a daily basis with LDAP. Whether this is on a Windows domain controller, or on a Linux OpenLDAP server, the LDAP protocol is very useful to centralize authentication. However, as your LDAP directory grows, you might get lost in all […]

Hacking 101

Overview of Mach-O binary

by TechnoHerder November 30, 2022April 2, 2023 Leave a comment

Mach-O is a binary format used by Apple for its systems. The binary format contains assembled bytes, data and other information. Structured by a list of load commands, where each load command hold the neccessary pointers to the contents. Header At offset 0 lies a header structure, struct mach_header, containing the general information about the […]

Page navigation

Previous 1 2 3 4 5 … 15 Next
Copyright © 2025 Techno Herder
Privacy Policy