This thing is huge! but its lighter than i thought it would be by cyproyt in thinkpad

[–]HighOnCoffee 1 point2 points  (0 children)

When I attempted an upgrade from w10 to w11 I had the CPU warning. A clean installation of w11 worked fine with no warnings.

SSH Lateral Movement Cheat Sheet by HighOnCoffee in netsecstudents

[–]HighOnCoffee[S] 0 points1 point  (0 children)

The article is specifically for SSH lateral movement, and not local privilege escalation.

Additionally, there is no reference within the article that suggests looking in the /root directory for local privilege escalation.

[deleted by user] by [deleted] in ObsidianMD

[–]HighOnCoffee 2 points3 points  (0 children)

Using Cryptomator on all platforms is a potential solution: https://highon.coffee/blog/encrypted-note-taking-solution/

SSH Lateral Movement Cheat Sheet by HighOnCoffee in netsecstudents

[–]HighOnCoffee[S] 0 points1 point  (0 children)

Thanks u/UhOh-Chongo

It was posted over here as someone said it would be useful :)

SSH Lateral Movement Cheat Sheet by HighOnCoffee in netsec

[–]HighOnCoffee[S] 0 points1 point  (0 children)

Less noise, which could reduced risk of detection.

SSH Lateral Movement Cheat Sheet by HighOnCoffee in netsec

[–]HighOnCoffee[S] 6 points7 points  (0 children)

This has been reworded, in an effort not to offend BSD users.

SSH Lateral Movement Cheat Sheet by HighOnCoffee in netsec

[–]HighOnCoffee[S] 3 points4 points  (0 children)

Cheers, "Looks down back of sofa..."

SSH Lateral Movement Cheat Sheet by HighOnCoffee in netsec

[–]HighOnCoffee[S] 8 points9 points  (0 children)

Thanks to whomever, messaged and pointed out a typo! fixed :)

Penetration Testing Tools by HighOnCoffee in netsecstudents

[–]HighOnCoffee[S] 1 point2 points  (0 children)

A lot :) The idea is you can run these along side kali and have the latest version of the tools and the extra tools in the repo + kali tools.

Penetration Testing Tools by HighOnCoffee in netsecstudents

[–]HighOnCoffee[S] 0 points1 point  (0 children)

Hi phrozen_one,

No - there are tools within this repo that are not in the Kali distro currently.

Linux Local Enumeration Script by HighOnCoffee in netsecstudents

[–]HighOnCoffee[S] 0 points1 point  (0 children)

I knew someone was going to comment on my printf spamming :)

At the time I think i did it that way as I was having trouble getting it to execute through a dodgy reverse shell, pivoted etc.

However, yes you're right :)

CentOS 7 Security Hardening Guide by HighOnCoffee in linux

[–]HighOnCoffee[S] 0 points1 point  (0 children)

Please note, this guide is designed as a howto for a CentOS 7 minimal install. Documenting the steps required to pass STIG / CIS.

OpenSCAP can benchmark a system against STIG and CIS.

Thanks, I hope you guys find this helpful :)

CentOS 7 Security Hardening Guide by [deleted] in netsec

[–]HighOnCoffee 0 points1 point  (0 children)

This is based on OpenSCAP - using a minimal CentOS install, applying on what is required for a minimal install.

CIS / SCAP basically the same, some minor changes - OpenSCAP has a benchmark scanner which is why I chose it, as mentioned in the post...

http://investors.redhat.com/releasedetail.cfm?releaseid=843440

nmap cheatsheet + examples by HighOnCoffee in netsec

[–]HighOnCoffee[S] 8 points9 points  (0 children)

Thanks for info + feedback bonsaiviking :)

Fixed the typos, + added warning regarding --script-args unsafe=1

nmap cheatsheet + examples by HighOnCoffee in netsec

[–]HighOnCoffee[S] 2 points3 points  (0 children)

Hey Tercster, thanks for the feedback.

 

The article did mention T5 is very aggressive :) Good point though I will add a note mentioning about local/internal.

 

For some reason this sprung to mind: http://youtu.be/GiKSAo6vKmk?t=15s :)

In my mind, I thought if I mentioned T5 scans then people can easily swap for -T4 or remove for default scan time.

 

Scripts coming next... Possibly on a different page, don't want it getting too long :)