- Private: How to Join the Infosec Community
- Private: [ Hacker Night School ] :: Excellent, well-written hacking lessons: HackingTutorials.org
- Private: Finding and Using Browser-saved Passwords: Another video from Starry Sky
- Private: Hacking for a digital marketer
- [ Hacker Night School ] :: [ Hiding Your Ass ] :: [ Using a VPN ]
- [ Hacker Night School ] :: [ Hiding Your Ass ] :: [ Using a Proxy Server ]
- [ Hacker Night School ] Being Anonymous: VPNs
- [ Hacker Night School ] :: TOR Browser Search Engines
- Private: [ Bug Bounty ] :: Hack Facebook for Fun and Profit!
- [ Hacker Night School ] :: Learn Python in 43 Minutes (if you’re a really fast learner)
- [ Hacker Night School ] :: Hacking Practice: the Command Injection ISO
- [ Hacker Night School ] :: Got a foothold on a Windows target? Now enable Remote Desktop.
- [ Hacker Night School ] :: [ Using Git ]
- [ Hacker Night School ] :: Tsuki CTF Pwns Access on HackTheBox
- [ Hacker Night School ] :: Exploiting sudo: Altering your PATH
- [ Hacker Night School ] :: WEP Cracking Basics in Kali
- [ Hacker Night School ] :: CSRF
- [ Hacker Night School ] :: A Memory Forensics with Volatility Writeup
- Private: [ Hacker Night School ] :: Adding the Kali Tools to Ubuntu
- Private: [ Hacker Night School ] :: Kali Linux Metapackages (All Tools or Subsets)
- Private: [ Hacker Night School ] :: Commando VM: a Windows Hacking “Distro”
- Private: [ Hacker Night School ] :: VulnHub Walk-Throughs: This is how you learn to pwn
- Private: [ Hacker Night School ] :: Metasploitable 3: A Hackable Windows VM
- Private: [ Hacker Night School ] :: Command VM: a Windows Red-Team VM from FireEye
- [ Hacker Night School ] :: WebGoat, An OWASP Hacking Practice Website
- Private: [ Hacker Night School ] :: Python for Malware Analysis
- Private: [ Hacker Night School ] :: Encoding and Decoding: Base64, ASCII, etc.
- [ Hacker Night School ] :: Using the Greenbone Vulnerability Scanner
- The KNOB Attack: Does this exploit from 2018 still work?
- [ Hacker Night School ] :: The Holy Unblocker
- [ Hacker Night School ] :: the POODLE attack, featuring TLS Downgrade
- [ Hacker Night School ] :: The Illustrated TLS Connection
Want to make your life easier once you’ve gotten a foothold on your Windows target? Enable Remote Desktop. See this article:
https://www.interfacett.com/blogs/how-to-remotely-enable-and-disable-rdp-remote-desktop/
TL;DR:
In cmd.exe:
Reg add “\\computername\HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server” /v fDenyTSConnections /t REG_DWORD /d /f
In Powershell:
Invoke-Command –Computername “server1”, “Server2” –ScriptBlock {Set-ItemProperty -Path "HKLM:\System\CurrentControlSet\Control\Terminal Server" -Name "fDenyTSConnections" –Value 0}
Don’t forget to allow RDP through the firewall:
Invoke-Command –Computername “server1”, “Server2” –ScriptBlock {Enable-NetFirewallRule -DisplayGroup "Remote Desktop"}
Now have fun!