Skip to content

Techno Herder

Knowledge Base for Penetration Testing

  • Home
  • Hacking 101

Categories

  • *nix-Based Attack (2)
  • Active Directory (1)
  • Active Reconnaissance (6)
  • Anti-Forensic Techniques (1)
  • Attack (6)
  • Blue Team (16)
  • Cloud (1)
  • Code Fortification (5)
  • Cryptography (1)
  • Customer Facing (1)
  • Database (4)
  • Hacking 101 (44)
  • Lateral Movement (1)
  • MacOS (1)
  • Mobile Penetration Testing (11)
  • Network Attack (26)
  • Network Scan & Map (4)
  • OSINT (4)
  • Pen Test Reporting (4)
  • Pentest (11)
  • Persistence Techniques (1)
  • Physical Security (1)
  • Post-Exploitation (5)
  • Reverse Engineering (3)
  • Social Engineering (3)
  • Tools (16)
  • Uncategorized (0)
  • Vulnerability Scanning (3)
  • Web App Attack (13)
  • Windows Attack (17)
  • Wireless & RF-based Attacks (3)

Category: Hacking 101

Database Hacking 101

GaussDB Database Review

by TechnoHerder July 15, 2023July 15, 2023 5 Comments

Walkthrough of the checks for a security review of a GaussDB database.

Blue Team Hacking 101 Network Attack

Kubernetes Security Review Cheat Sheet

by TechnoHerder July 15, 2023July 15, 2023 3 Comments

Command reference and resources for reviewing the security posture of a Kubernetes infrastructuree.

Hacking 101 Tools

Add a new Directory to $PATH in Kali Linux

by TechnoHerder May 17, 2023May 17, 2023 4 Comments

Add a new Directory to environment path variable, $PATH, in Kali Linux to help setup and easily run tools. The default shell of Kali Linux is now zsh.

Hacking 101 Post-Exploitation

Upgrading Simple Shells to Fully Interactive TTYs

by TechnoHerder May 14, 2023 1 Comment

Method 1: Python pty module One of my go-to commands for a long time after catching a dumb shell was to use Python to spawn a pty. The pty module let’s you spawn a psuedo-terminal that can fool commands like su into thinking they are being executed in a proper terminal. Spawn /bin/bash using Python’s PTY module, and connect the controlling shell […]

Hacking 101 Web App Attack

Easy Reverse Shell through WordPress Plugin

by TechnoHerder May 8, 2023May 11, 2023 1 Comment

Quick easy steps to create a WordPress pugin that will give you a reverse shell.

Hacking 101 Windows Attack

Example of Dumping Hashes and Cracking

by TechnoHerder December 6, 2022June 19, 2023 2 Comments

A walkthrough on how to dump hashes in the SAM file using Mimikatz and crack them into cleartext credentials with John the Ripper or Hashcat.

Hacking 101

Renew Certificates on Kubernetes with Cert Manager and Reloader

by TechnoHerder December 5, 2022January 2, 2023 Leave a comment

In this article, you will learn how to renew certificates in your Spring Boot apps on Kubernetes with cert-manager and Stakater Reloader. We are going to run two simple Spring Boot apps that communicate with each other over SSL. The TLS cert used in that communication will be automatically generated by Cert Manager. With Cert […]

Blue Team Code Fortification Hacking 101

HTTPS on Kubernetes with Spring Boot, Istio and Cert Manager

by TechnoHerder December 5, 2022January 2, 2023 Leave a comment

In this article, you will learn how to create secure HTTPS gateways on Kubernetes. We will use Cert Manager to generate TLS/SSL certificates. With Istio we can create secure HTTPS gateways and expose them outside a Kubernetes cluster. Our test application is built on top of Spring Boot. We will consider two different ways of […]

Hacking 101 Network Attack Windows Attack

AS-REP Roasting

by TechnoHerder December 4, 2022January 17, 2023 Leave a comment

In this blog post we will look at how to perform AS-REP roasting in two different ways, how to use hashcat to crack a krbasrep5 hashes, and how to mitigate this type of attack. During kerberos pre-authentication, a user’s NTID is used to encrypt a timestamp and then the domain controller will attempt to decrypt […]

Hacking 101 Post-Exploitation Windows Attack

Proving Grounds – Hutch

by TechnoHerder December 4, 2022January 2, 2023 Leave a comment

In this Walkthrough, we will be hacking the machine Hutch from Proving Grounds Practice. To begin, we will utilize the ability to perform an anonymous LDAP search to dump account information where we will find a password. With valid credentials, we will run Bloodhound remotely to query the DC and find that our user has […]

Page navigation

1 2 3 … 5 Next
Copyright © 2025 Techno Herder
Privacy Policy