Hello Ethical Hackers!
I will need a full guide for eachone of all these below I can give up to $15-$20 for each one 4-5 pages each with examples or screenshots so I can create a complete guide for all of these with average $400 USD and cretew a quality guide. Specifically:
if interested select one (1) of the following until July 18:
1. Convert [login to view URL] to use the patator instead of medusa ([login to view URL])
2. Develop a manual/guide of ncrack and basic use of the patator. Compare them and give examples of how to use them.
[login to view URL] [login to view URL]
3. Develop a report describing what netbios is and how the attacker to a windows domain can exploit it . Give examples with specific tools.
4. Develop a report that describes what kerberos authentication is in a windows domain.
5. Develop a report that explains which the extra security features are in windows 10, specifically Credential guard and how we can apply them using powershell.
6. Develop a report that explains which additional security features are in Windows 10, specifically Windows Defender Advanced Threat Protection, and how to use them with powershell.
[login to view URL] a report that states which additional security features are in windows 10, specifically Windows Defender Application Guard, how can we apply them using powershell.
8. Develop a metasploit basic use / operation guide and refer to the key modules available for metasploit.
9. Develop a guide/manual to implement the following end-user attack technique: [login to view URL]
10. Develop a basic use guide for the empire. ([login to view URL])
11. Develop a guide listing specific examples of whitelisting bypass techniques: [login to view URL]
[login to view URL] a task that describes what the Server Message Block (SMB) is and how it can be exploited by the attacker in a windows domain. Give examples with specific tools.
[login to view URL] a task that describes what Kerberoasting is and how it can be exploited by the attacker in a windows domain ([login to view URL]). Give examples with specific tools.
[login to view URL] up a guide to using nmap and in particular the nmap scripting language. Give examples of how to develop scripting modules.
[login to view URL] a task that describes what Pass the Hash is and how the attacker can exploit it in a windows domain ([login to view URL]). Give examples with specific tools.
[login to view URL] out what is Pass the Ticket and how it can be exploited by the attacker in a windows domain ([login to view URL]). Give examples with specific tools.
17. Develop a manual for the use of koadic ([login to view URL]).
18. Develop a pupy user guide ([login to view URL]).
19. Elaborate a task that describes what NTLM v2 Authentication is and how it can be exploited by the attacker in a windows domain. Give examples with specific tools.
20. Install, test, and develop a ReelPhish user guide:
[login to view URL]
[login to view URL]
21. Develop a MailSniper User Guide and give examples of how to use [login to view URL]
22. Develop a Throwback User Guide and give examples of how to use [login to view URL]
23. Develop a user guide for the responder and give examples of how to use [login to view URL]
If any of the above issues is good for me, I will wait for updates.
Thanks.