Tool Review: WinSSH
xct2023-07-09T11:11:18+00:00This video is a short overview on what you can do with WinSSH and how to use it. It essentially acts like a reverse shell with (dynamic-) port forwarding & file up- and download features that is only using trusted windows binaries.
VL Intercept – Walkthrough
xct2023-07-18T09:24:00+00:00Intercept is a chain of vulnerable machines on Vulnlab and involves stealing hashes with lnk files, a RBCD-Workstation takeover, exploiting GenericALL on OUs & finally attacking ADCS using ESC7.
Shinra & Wutai Videos
xct2023-05-05T14:54:13+00:00I'm linking the playlists for both labs here to avoid single posts for every video. Check out https://vulnlab.com if you want to try them out!
VL Shinra Part 4 – Reverse Engineering, Binary Exploitation & Ansible
xct2023-01-28T09:25:14+00:00This is part four of the Shinra series. We will get to access to a linux server via ssh, exploit a small authenticator app & use ansible to move to the next box.
VL Shinra Part 3 – Initial Payload Design, Host Enumeration & getting SYSTEM
xct2023-01-18T17:06:46+00:00This is the third video of the Shinra series. We will get a shell on Ashleighs machine & escalate privileges.
VL Shinra Part 2 – Enumerate, Enumerate, Enumerate!
xct2023-01-18T17:07:53+00:00This is the second video of the Shinra series. Before setting foot onto any of the network's internal machines, we are going to spend a bit of time enumerating various things from our machine