Monthly Archives: January 2014

Packet sniffing from Meterpreter

Following with the post chain about Meterpreter extensions, I’m going to show you how “sniffer” extension works. This module let’s you capture traffic from one network interface of the victim host and dump it to a “pcap” file on the

Posted in Metasploit, Meterpreter, Post-Exploitation, Sniffer

Mimikatz Meterpreter extension

During a PenTest one of the main objectives of the PenTester when a Windows host is compromised is to obtain the user authentication hashes, to try pivot to other systems on the target network using the “Pass The Hash” attack.

Posted in Metasploit, mimikatz, Post-Exploitation

Post-Exploitation with “Incognito”.

Incognito is a tool used to escalate privileges inside an Active Directory domain on the post exploitation phase of a PenTest. It was born as a standalone tool, later was included in Metasploit as a module and finally it was

Posted in Incognito, Metasploit, Post-Exploitation

Bypass new generation Firewalls with meterpreter and ssh tunnels

In this post I’m going to show the main content of an article published in  Kali Linux 2 | Pentest Extra 05/2013 by me. I hope you enjoy it. Introduction During a recent penetration test I found a Windows host running

Posted in Firewall, Metasploit, SSH

Welcome to my blog

With the new year I decided to go one step further and start posting in English as well as in Spanish. So this post is just to welcome all the new english readers. I hope the contents of this blog

Posted in No category