Skip to content
BOOK_GHANIM

BOOK_GHANIM

  • ProgrammingExpand
    • C#
    • Python
  • CyberSecExpand
    • Articles
    • HandbooksExpand
      • Active Directory – Notes, Methodology, Cheatsheet
      • AV Evasion 101: Essential Techniques and Concepts
      • Buffer Overflow – Notes and cheatsheet
      • Command And Control – C2 Framework
      • OSEP Checklist
      • Pivoting and port forwarding guide
      • THM – Windows Privilege Escalation – Part 16
      • THM – Linux Privilege Escalation – Part 15
      • THM – Common Linux Privilege Escalation – Part 20
      • THM – NMAP Documentation and Commands – Part 13
      • THM – What the Shell – Part 19
    • Notes
    • Write-ups
  • GuidesExpand
    • HomeLab
    • Homelab Cheatsheet
  • HandbooksExpand
    • Handbook I ? Basic
    • Handbook II ? Advanced
    • Handbook III ? Cloud
    • Handbook IV ? RedTeam
    • Handbook V ? Maldev
  • Methodology
  • Toolbox
  • About
  • Search
BOOK_GHANIM
BOOK_GHANIM
  • Setting Up a Detection Lab
    HomeLab

    Setting Up a Detection Lab

    Byaghanim August 5, 2024September 12, 2024

    Update I was able to upgrade my CPU and motherboard to i9 9900k. 9900k have a passmark above 18000. After upgrading my hardware I destroyed all my ranges and used the config below for Elastic EDR, GOAD and Kali and deployed it again. This time, it all worked without any problems as opposed to earlier….

    Read More Setting Up a Detection LabContinue

  • Handbook V – Maldev
    Notes

    Handbook V – Maldev

    Byaghanim December 20, 2023November 17, 2024

    Work in Progress Courses SEKTOR7 Institute https://maldevacademy.com/ EvasionEDR By Matt Hand Sources URL Description Category https://github.com/NUL0x4C/HellShell HellShell GitHub repository Penetration Testing https://www.corelan.be/index.php/2010/06/16/exploit-writing-tutorial-part-10-chaining-dep-with-rop-the-rubikstm-cube/#weapon Exploit writing tutorial on Corelan.be Exploit Development https://www.corelan.be/ Corelan.be website Cybersecurity https://github.com/Krypteria/AtlasLdr AtlasLdr GitHub repository Malware Analysis https://labs.jumpsec.com/obfuscating-c2-during-a-red-team-engagement/ Article on obfuscating C2 during Red Team engagement Red Teaming https://github.com/matterpreter/DefenderCheck DefenderCheck GitHub repository Security…

    Read More Handbook V – MaldevContinue

  • Notes

    OSEP Checklist

    Byaghanim November 9, 2023December 15, 2023

    OSEP/osep_checklistv2.md at main · In3x0rabl3/OSEP · GitHub Web Application: MSSQL: Privilege Escalation: Windows Linux Lateral Movement:

    Read More OSEP ChecklistContinue

  • C# – Basics and examples
    C#

    C# – Basics and examples

    Byaghanim March 3, 2023March 10, 2025

    Learning Sources Programming Concepts – C# | Microsoft Learn – C# Mastercourse – IAmTimCorey – If you’re starting out, this is the best place to start. The C# Academy – Learn by doing CodeCrafters | Advanced programming challenges – Learn by doing The C# Player’s Guide (5th Edition) – Great book about learning Csharp. Takes…

    Read More C# – Basics and examplesContinue

  • AV Evasion 101: Essential Techniques and Concepts
    Notes

    AV Evasion 101: Essential Techniques and Concepts

    Byaghanim February 7, 2023December 11, 2023

    Source Good tools Malware forums/channels/discord Test payload against AV Defcon – Writing custom backdoor payloads with C# GitHub – mvelazc0/defcon27_csharp_workshop: Writing custom backdoor payloads with C# – Defcon 27 Workshop Step by Step for obfuscating code AV Evasion MindMap – From Start to finish (AV) Anti-Virus – The Hacker Recipes General AV Evasion cheatsheet Check…

    Read More AV Evasion 101: Essential Techniques and ConceptsContinue

  • Python Notes and Examples
    Python

    Python Notes and Examples

    Byaghanim December 14, 2022January 24, 2023

    Here are my notes from different courses I’m taking. Courses and resources https://www.udemy.com/course/learn-python-and-ethical-hacking-from-scratch/ https://tryhackme.com/room/pythonbasics https://tryhackme.com/room/pythonforcybersecurity Notes from ‘Learn Python & Ethical Hacking From Scratch‘ Lecture 1 – MAC Address Changer https://docs.python.org/3/library/subprocess.html Change MAC address using subprocess Script upgrade using variables Input from user Handling user input The above example is not a secure way as…

    Read More Python Notes and ExamplesContinue

  • Command And Control – C2 Framework
    Notes

    Command And Control – C2 Framework

    Byaghanim October 17, 2022October 3, 2024

    This is a list of Command and control (C2) servers that I’ve tested. Cobalt Strike Covenant Installation and setup From the Covenant GitHub, “Covenant is a .NET command and control framework that aims to highlight the attack surface of .NET, make the use of offensive .NET tradecraft easier, and serve as a collaborative command and…

    Read More Command And Control – C2 FrameworkContinue

  • Pivoting and port forwarding guide
    Notes

    Pivoting and port forwarding guide

    Byaghanim August 25, 2022June 1, 2023

    This is notes taken from the THM room ‘Wreath’, which is a great room for learning Active Directory and pivoting. https://www.tryhackme.com/room/wreath And from other sources. Summary What is pivoting? Pivoting is the art of using access obtained over one machine to exploit another machine deeper in the network. It is one of the most essential…

    Read More Pivoting and port forwarding guideContinue

  • Active Directory – Notes, Methodology, Cheatsheet
    Notes

    Active Directory – Notes, Methodology, Cheatsheet

    Byaghanim June 15, 2022August 8, 2025

    These are my notes from the Active Directory networks at TryHackMe, as well as notes from other sources. Inspo: Work in progress References Matrix Impacket – SecureAuth Name Explanation Tools/attack example Unconstrained delegation Allows a service to delegate user credentials to any service on any computer. Exploiting unconstrained delegation involves accessing services running with SYSTEM…

    Read More Active Directory – Notes, Methodology, CheatsheetContinue

  • TJ_Null’s OSCP Prep – HTB – Bastion
    Writeups

    TJ_Null’s OSCP Prep – HTB – Bastion

    Byaghanim April 21, 2022

    On this Windows machine there was a SMB share that had two VHDs that we could remotly mount. The VHDs looked like a backup of a Windows. Using secretsdump we could dump the hash from from the /system32/config, and get the hash for users. Using john the ripper, I cracked the hash for L4mpje. After…

    Read More TJ_Null’s OSCP Prep – HTB – BastionContinue

  • Notes

    Protected: OSCP Prep

    Byaghanim April 8, 2022

    There is no excerpt because this is a protected post.

    Read More Protected: OSCP PrepContinue

  • TJ_Null’s OSCP Prep – HTB – Tabby
    Writeups

    TJ_Null’s OSCP Prep – HTB – Tabby

    Byaghanim April 5, 2022April 5, 2022

    On this Linux machine I abused LFI to find the password for admin panel for Tomcat. From there I used CLI to upload .WAR file to get a reverse shell. In /var/www there was a zip file which was password protected. Cracking the password using John, we find the credentials for the user Ash. From…

    Read More TJ_Null’s OSCP Prep – HTB – TabbyContinue

  • TJ_Null’s OSCP Prep – HTB – FriendZone
    Writeups

    TJ_Null’s OSCP Prep – HTB – FriendZone

    Byaghanim April 5, 2022April 5, 2022

    This Linux machine had a PHP page with LFI vulnerability. To upload a webshell I used SMB. From there we find credentials from a database config file. To root the machine I added a reverse shell to a writeable python module which was called upon by a python script run by root in cronjob. Enumeration…

    Read More TJ_Null’s OSCP Prep – HTB – FriendZoneContinue

  • TJ_Null’s OSCP Prep – HTB – Sunday
    Writeups

    TJ_Null’s OSCP Prep – HTB – Sunday

    Byaghanim April 5, 2022

    On this Solaris machine we used finger to enumerate users. We then guessed the password for the enumerated user to get SSH access. From there we escalated our privilege to Sammy through a shadow file we had access to. I cracked the password and as able to SU to Sammy. Sammy was able to run…

    Read More TJ_Null’s OSCP Prep – HTB – SundayContinue

  • Buffer Overflow – Notes and cheatsheet
    Notes

    Buffer Overflow – Notes and cheatsheet

    Byaghanim March 21, 2022September 25, 2022

    Buffers are memory storage regions that temporarily hold data while it is being transferred from one location to another. A buffer overflow (or buffer overrun) occurs when the volume of data exceeds the storage capacity of the memory buffer. As a result, the program attempting to write the data to the buffer overwrites adjacent memory…

    Read More Buffer Overflow – Notes and cheatsheetContinue

Page navigation

1 2 3 … 7 Next PageNext

© 2025 BOOK_GHANIM

Search
  • Programming
    • C#
    • Python
  • CyberSec
    • Articles
    • Handbooks
      • Active Directory – Notes, Methodology, Cheatsheet
      • AV Evasion 101: Essential Techniques and Concepts
      • Buffer Overflow – Notes and cheatsheet
      • Command And Control – C2 Framework
      • OSEP Checklist
      • Pivoting and port forwarding guide
      • THM – Windows Privilege Escalation – Part 16
      • THM – Linux Privilege Escalation – Part 15
      • THM – Common Linux Privilege Escalation – Part 20
      • THM – NMAP Documentation and Commands – Part 13
      • THM – What the Shell – Part 19
    • Notes
    • Write-ups
  • Guides
    • HomeLab
    • Homelab Cheatsheet
  • Handbooks
    • Handbook I ? Basic
    • Handbook II ? Advanced
    • Handbook III ? Cloud
    • Handbook IV ? RedTeam
    • Handbook V ? Maldev
  • Methodology
  • Toolbox
  • About
  • Search