Bishop Fox named “Leader” in 2024 GigaOm Radar for Attack Surface Management. Read the Report ›

Breaking & Entering: A Pocket Guide for Friendly Remote Admins

This user-friendly guide offers a comprehensive offensive security roadmap for sysadmins, penetration testers, and other security professionals.

Illustration of 3 documents next to each other

Get a leg up on your next pen test or CTF with our handy guide!

Previously introduced at DEF CON 29, “Breaking & Entering” is an easy-to-consume, user-friendly resource for sysadmins, penetration testers, and other security professionals. It delivers a comprehensive offensive security roadmap, covering every phase of an engagement from beginning to end – just what you need for your next penetration test or CTF!

Discover techniques and shortcuts for conducting OSINT and reconnaissance, host enumeration and post-exploitation, secure pivoting (tunneling), and exfiltration.

Other things you’ll find inside include:

  • Information on how Google hacking (or “Google Dorking”) can allow you to level up your OSINT efforts
  • A thorough initial list of commands for investigating a host system
  • An SMB/Kernel version chart for matching enumerated information to system versions, common registry locations
  • Useful technical documentation references like NIST publications and tunneling worksheets

Andy doering

About the author, Andy Doering

Bishop Fox Alumnus

Andy Doering is a Bishop Fox alumnus. He was an Operator with Bishop Fox's Cosmos (formerly CAST) team. Prior to his time at Bishop Fox, he served as a Non-Commissioned Officer in the U.S. Army where he worked as a Senior Exploitation Analyst and Training Lead, developing a specialization in Computer Network Operations (CNO), Digital Network Analysis (DNA), and Intelligence Surveillance and Reconnaissance (ISR).

More by Andy

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.