Hak5PracExploit's profile picture. We aren't here to talk about theoretical hacks, or what-If scenarios. Call BS on us for anything you can't get working or don't think actually happens.

Practical Exploition

@Hak5PracExploit

We aren't here to talk about theoretical hacks, or what-If scenarios. Call BS on us for anything you can't get working or don't think actually happens.

Practical Exploition reposted

Another episode of Practical Exploitation (@Hak5PracExploit) is out: youtube.com/watch?v=4ydjpS… talking about Bloodhound-py by the awesome crew over at @foxit and a DNS workaround for using bloodhound over a pivot using DNSChef by @_iphelix

mubix's tweet card. BloodHoundAD, ProxyChains & DNSChef - Practical Exploitation with...

youtube.com

YouTube

BloodHoundAD, ProxyChains & DNSChef - Practical Exploitation with...


Apologies for the delay in a new episode. @mubix lost his job due to lay offs and luckily found new employment. We will resume our regularly scheduled programming as soon as possible. Thanks for your understand. :)


Hit us up if you like the show. Want to see a tool or technique? DM, email, post a Youtube comment!

Episode 1 of @Hak5PracExploit is LIVE!! - > youtube.com/watch?v=tVgJ-9… - In it we talk about WinRM, Evil-WinRM and a bit about AMSI bypasses. w00tw00t. Let me know what you think! Do you like the new format? Like, Subscribe!

mubix's tweet card. Pentesting with Evil WinRM - Practical Exploitation [Cyber Security...

youtube.com

YouTube

Pentesting with Evil WinRM - Practical Exploitation [Cyber Security...



Lets try this again ;-)




Practical Exploition reposted

The @DerbyCon Scavenger Hunt (black badge event) ends with cake (in about a month and a half) j.mp/1Kqt7kc


been a while since I've been around. might be about time to kick this back into gear


Simple Framework Domain Token Scanner - This is so much more than the title… tumblr.com/ZSigOyBOp7sN


Video: Revenge of the Bind Shell - Using Meterpreter and Teredo to make your perimeter useless. http://tumblr.com/xi6jgsvap


myneus asked: Hello Mubix, hey have my blog up and rolling now which you are following on here but do you... http://tumblr.com/xi6jdesxl


Anonymous asked: Dear Rob, I’ve always wanted to learn the Spike fuzzing framework well enough to write my... http://tumblr.com/xi6jdernm


Anonymous asked: A step-by-step how to on the popular Dan kaminsky DNS Cache Poisioning Attack would be nice.... http://tumblr.com/xi6jdepwa


Anonymous asked: This isn’t really a question, but I did my own malware analysis research recently and... http://tumblr.com/xi6jdea6s


Anonymous asked: Wonderful down-to-earth website on vulnerability testing! I tried the php shell demo... http://tumblr.com/xi6jde7yz


Anonymous asked: How do you automatically activate a session in metasploit when you are using a... http://tumblr.com/xi6jde6kl


Anonymous asked: Hi, I just recently got into exploits. Can you give us some insights which web pages you... http://tumblr.com/xi6jddzcu


Anonymous asked: more on ipv6! joe klein has an interesting presentation on the dojosec blog (july), what are... http://tumblr.com/xi6jddudv


Anonymous asked: Thanks for doing this. Great job! One thing - can you make the name of your postings match... http://tumblr.com/xi6jddalh


Anonymous asked: Mubix, thx for all the precious knowledge and tech you share with us. Lot of a videos i came... http://tumblr.com/xi6jdbzdm


Loading...

Something went wrong.


Something went wrong.