Some post exploitation techniques using gawk.
Category: NSM
Using finger.exe to Transfer Files
Abusing finger.exe to send data over the network
Nmap + HASSH = <3
Fun project I did a while back to improve 0x4D31's hassh-utils NSE script.
Changing apt’s User-Agent string
Quick howto on changing apt/apt-get's User-Agent string.
Bypassing IPv4 Security Measures Using IPv6
Read about how one may take advantage of ipv6 neglect.
Brief Experiment With SSH Honeypots
I deployed a fake SSH server today and studied its traffic overnight.