JOIN US TOOLS

Subscribe
20 May 2016

Penetration Testing with Splunk: Leveraging Splunk Admin Credentials to Own the Enterprise

Update 7/21/2016: Splunk has released an excellent blog post covering the best practices for deploying Splunk securely: http://blogs.splunk.com/2016/07/10/best-practices-in-protecting-splunk-enterprise/ . If you are unsure if you have deployed your Splunk in a secure manner, review these tips and the referenced documentation from Splunk…

Kevin Dick
07 May 2016 on powershell bind shell .NET Veil Veil-Evasion Stagers Meterpreter

Dissecting Veil-Evasion Powershell Payloads and Converting to a Bind Shell

There are many popular and powerful payloads available to us as penetration testers, and oftentimes we use them without fully understanding how they work. This post will deconstruct Veil-Evasion's Powershell Metasploit stagers and walk-through converting the reverse TCP stager to a bind TCP stager. By reading this post…

Kevin Dick
← Newer Posts Page 8 of 8
Tevora © 2025