Quick Reference: Empire Persistence Modules

During a penetration test you may find yourself in a situation where your foothold in the network is tenuous and […]

Meterpreter Transports: Digging in with your Shell!

The scenario is all too familiar: Its a been a long week of digital warfare, and you are about to […]

Leveraging MS16-032 with PowerShell Empire

It’s not very often in the life of a pentester that you find a point-and-click exploit that works right out […]

Scripting RDP for Pillaging and Potato

Previous posts on the WarRoom have addressed expediting the use of remote desktop to facilitate pillaging.  This post explores scripting […]

Accessing Internal Web Apps via Meterpreter on a Jumpbox

Post breach on a recent external penetration test, I wanted to do some poking around the target’s intranet which required […]

Spawning Meterpreter Over Bluetooth

The last post on Shells with Spencer presented code to spawn a shell with a full PTY with a Bluetooth RFCOMM socket for […]