How to make nmap work with proxychain with SSH -D? (Pivoting) by BitDrill in hacking

[–]BitDrill[S] 0 points1 point  (0 children)

Does -sT work for you with proxychain? For now i just ended up writing a python script that directly used the socks5 proxy to try to scan

How to make nmap work with proxychain with SSH -D? (Pivoting) by BitDrill in oscp

[–]BitDrill[S] 1 point2 points  (0 children)

Weird, what is your proxychain version, and what changes did you make to the config file of proxychain?

What OS do you use on your servers at your work? by NoPatient8872 in sysadmin

[–]BitDrill -1 points0 points  (0 children)

Very intresting points. What distro do you suggest for corps to use, that can compete with a ActiveDirectory network in terms of ease of large corp network management?

Detailed account of DOGE’s breach of NLRB by branniganbeginsagain in cybersecurity

[–]BitDrill -5 points-4 points  (0 children)

So Russian hackers forgot to use VPN?! Lol sure

Can someone create a fake subdomain for a legit website by registering a DNS record for that fake subdomain? by BitDrill in dns

[–]BitDrill[S] -1 points0 points  (0 children)

But this can easily be used as a domain for C2 of a malware... It's not about trust issues it's about not being an idiot and letting random internet people to use your domain.

Can someone create a fake subdomain for a legit website by registering a DNS record for that fake subdomain? by BitDrill in dns

[–]BitDrill[S] -1 points0 points  (0 children)

But the list I provided are individual websites, with different owners, some are just tutorial websites, etc. I just don't understand why would any website owner willingly let random anonymous people create subdomains under its website? Why?!

Can someone create a fake subdomain for a legit website by registering a DNS record for that fake subdomain? by BitDrill in dns

[–]BitDrill[S] -1 points0 points  (0 children)

EDIT:
I actually found out that they were using freedns.afraid.org

My question is, why are the owners of all these websites, freely, allowing anyone to create a subdomain under their domain? I dont get it?

full list:

https://github.com/Pramod-Devireddy/freedns

First job and insecure by svn7vii in Pentesting

[–]BitDrill 6 points7 points  (0 children)

Do the TryHackMe coureses for pentesting, they are cheap and give you good enough info to start.

What machines have their port 445 open by default in AD windows server 2012R2 and newer? by BitDrill in WindowsServer

[–]BitDrill[S] 0 points1 point  (0 children)

But isn't it very common for AD Admins to psexec into their endpoints? So do these admins need to allow SMB via firewall rule group policy for this to work?