Archives : Tech Blog

  • Certified Ethical Hacker (CEF) – Recover Local Administrator or User password

    You will need a usb key for this process to work Step 1. Download Rufus from the website on google Step 2. Download Hierens boot cd from google. The latest version is essential Step 3. Launch Rufus and select the connected USB key ! Don’t choose the wrong one you will lose your data. Step […]

    READ MORE
  • Certified Ethical Hacker (CEF) – Attacks

    —nslookup By typing nslookup and entering the shell we can change record types Set type=mx Set type=aaaa Server 8.8.8.8 change your name server —NBIOS windows machines listen on TCP/139 this can be probed for -MAC address -Domain name -File Shares -User Groups on linux(kali) we use nbtstat -v -h 192.168.1.2 on windows NBIOUS Emnumerator has […]

    READ MORE
  • Certified Ethical Hacker (CEF) – Concepts Pt2

    —scapy Scapy is a tool that you can modify every aspect of the packet leaving the software for example we can change src,dst,port,mac address —Proxy Switcher This Application lists and tests public proxy servers on the internet  to hide your Identity —NBIOS windows machines listen on TCP/139 this can be probed for -MAC address -Domain […]

    READ MORE
  • Certified Ethical Hacker (CEF) – Concepts

    —Windows Auditing To disable all auditing on a windows machine we can use the CLI add auditpol.exe auditpol.exe /clear We can also delete logs on linux Rm /var/log/messages Metasploit can also clear logs remotely —msfvenom and sessions Because many clients are behind a firewall, we need the client to initiate the session outbound to us […]

    READ MORE
  • Certified Ethical Hacker (CEF) – AD Database Cracking

    —Hacking Active Directory     Download Rainbow Crack run ->      rtgen ntlm lowerapla 3 3 0 3800 3 0     RCRACK_GUI.exe

    READ MORE
  • Certified Ethical Hacker (CEF) – HPING DDOS

    —HPING3 synflood a host from random IPs hping3 -s -p80 192.168.1.14 –rand-source —flood can be used to flood packets to a device can be used to check if a UDP port is open can be used to sent TCP/UDP Pings can be used to limit the TTL field to see multiple IP’s on a destination

    READ MORE
  • Certified Ethical Hacker (CEF) – NMAP

    —NMAP Ping sweep a subnet Nmap -sn 172.16.0.0/24 Send multiple source IP address’s also with yours This will throw off IDS or IPS because it doesn’t know who the real attacker is Nmap 192.168.1.1 -D 1.1.1.1 2.2.2.2 Determine the OS Type -sS = use TCP -P0 = Use all protocols -sV = Detect then OS […]

    READ MORE
  • Cisco Voice – CME Hunt Groups

    —HUNT Groups CME ephone-hunt 1 peer/longest-idle/sequential  //peer = round robin, squential left to right until line in use. pilot 9000 //Number for hunt group. list <ext>, <ext>, *, * final <ext> //specify a finall number to ring if list is exhusted. max-timeoute 32 timeout 24, 8 ,8 ,8 //time before jumping to next number. statistics […]

    READ MORE
  • Cisco VOIP – Concepts Part 2

    //Paging. Paging is the ability to make an announcement on speaker phone for a group of people. Could be used for a fire senerio. Dial the extension to make the announcement. First create the groups for your teams CCP -> Configuration -> Unified Comms -> Telephone Features -> Paging Numbers -> Add Then create the […]

    READ MORE
  • Cisco Voice – Unity

    —Cisco Unity Connection voicemail.can be used with PABX system can be communicating with TIMG(T1 to sip) OR PIMG(port 8 analogue ports) Users can be imported via manual, CSV, CUCM, LDAP Uses the protocol SCCP (Skinny) or SIP. to communicate with CUCM //Setting up voicemail using SCCP SCCP OVerview Voicemail Profile      | Voicemail Pilot […]

    READ MORE