SANS Penetration Testing: Category - Post Exploitation

SANS Pen Test Poster: Pivots Payloads Boardgame

We are excited to introduce to you the new SANS Penetration Testing Educational Poster, "Pivots & Payloads Board Game"! It is a poster and a board game. How is it a board game? You can lay it down on a table, cut out the game pieces and game modifiers, use a dice to move … Continue reading SANS Pen Test Poster: Pivots Payloads Boardgame


Pen Test Poster: "White Board" - Bash - Find Juicy Stuff in the File System

By Matthew Toussain, Geoff Pamerleau Pilfering data is a post-exploitation phase that rarely receives enough credit. As pentesters, the way we demonstrate security risk and the way we escalate our attacks to a new level is based entirely on what we find after the compromise is realized. While manually driving the command line from directory … Continue reading Pen Test Poster: "White Board" - Bash - Find Juicy Stuff in the File System


Got Meterpreter? PivotPowPY!

by Cliff Janzen My how time flies. It seems like only yesterday I wrote the post Got Meterpreter? Pivot! (/blog/2012/04/26/got-meterpreter-pivot), but it has been four and a half years. In our industry, the only thing constant is change and Mr. Ed Skoudis gave me the opportunity to revisit this topic to see what has … Continue reading Got Meterpreter? PivotPowPY!


NoSQL? No Problem! Pillaging MongoDB for Fun and Profit

By Josh Wright Database technology continues to evolve to meet different application needs. One example of this is the adoption of NoSQL databases used by many different modern web applications. NoSQL databases depart from the traditional table-based storage mechanisms widely known and loved (mildly appreciated?), and instead store simple key-value data pairs, JSON documents, graph … Continue reading NoSQL? No Problem! Pillaging MongoDB for Fun and Profit


Post Exploitation Redux Webcast Slides

Last Thursday, John Strand and I delivered a new webcast on post exploitation, covering all kinds of tips and tricks. I focussed on some of the cool stuff you can do with the Windows netsh command, including setting up port pivots, sniffing, and gaining remote access to a target's network configuration. John Strand discussed a … Continue reading Post Exploitation Redux Webcast Slides