for explots use the following websites
- cvedetails.com
- exploitdb.com
- rapid7.com
- 0day.today
To check the IP address of the web-application which is behind the firewall
- ping the domain
- Tracert the site
- nslookup
- verify if the website is really giving the firewall IP
- securityTrails and search domain
- censys.io
- shodan.io
https://github.com/jonaslejon/malicious-pdf
If you Admin creds -- download RSAT and Access Active directory users and group
Get-WindowsCapability -Name RSAT* -Online | Add-WindowsCapability -Online
Look for the RSAT is present in the System -- > settings -> Optionals features
To assign the IP in the windows look for the Network apdapter Control Panel\Network and Internet\Network Connections Select network adapter Ethernet -> right click -> properties -> Internet Protocol version 4 (TCP/IPv4) Enter the IP
ACcess the share folder through Windows
- Open run (ctrl + r) \IP
- File explorer \IP
Access share folder through kali smbclient and smbmap
- smbclient -H IP
- smbmap -H IP -d domain -u ad_id -p ad_pass