Blog

Welcome! In the fast-paced world of infosec, finding clear and practical guidance can be a challenge. Many experts are brilliant at what they do, but their tutorials often skip steps or assume prior knowledge. That’s where this blog comes in. I’ve built it as an online manual, offering detailed, step-by-step penetration testing guides that take nothing for granted. Whether you’re a beginner or looking for alternative methods, this blog is designed to help you learn, troubleshoot, and grow in infosec.

  • Part 3 – Getting a Reverse Shell over a Chisel Pivot

    Introduction In this example we are going to demonstrate how we can get a reverse shell on the Marvel DC through our pivot point on the dual-homed Punisher machine using a netcat listener on our Kali machine. Overview of how to get a reverse shell using a chisel pivot Lab Setup & Network Settings Download…

  • Part 2 – Using Chisel for Port Forwarding

    Introduction In this example we are going to use Chisel to access an application or service running on a port on our internal server. Lab Setup & Network Settings Download the Chisel Binaries If you haven’t downloaded and installed the binaries, go to part one in this series: Chisel with a Socks5 proxy and Proxychains…

  • Part 1 – Using Chisel with a Socks5 proxy and Proxychains for Pivoting

    Introduction Pivoting is one of the most fundamental skills a penetration tester needs to learn once they have mastered the basics. Early on in my learning journey I really struggled to understand pivoting because of the bewildering array of options and tools. Too often pivoting tutorials seem to consist of “use this tool and these…

  • Developing Powershell Reverse Shells to Bypass Windows Defender

    Preparation Windows Developer VM There are several Windows executables that need to be downloaded and compiled in Visual Studio. The easiest way to do this is to download and install a Windows Developer VM from here: Kali Kali is necessary for testing your reverse shells. We will run a netcat listener to catch any shells…

  • CRACKING THE PASSWORDS FROM THE SHADOW AND PASSWD FILES.

    So you’ve managed to get root on a linux virtual machine, congrats! However this isn’t where the fun stops. From here you can access the files containing the usernames and their hashed passwords. These files are known as the passwd and shadow files. They can be combined into one file using the unshadow tool so…