Understand your current state of ransomware readiness and prepare for ransomware attacks. Get the Guide ›

Breaking & Entering: A Pocket Guide for Friendly Remote Admins

This user-friendly guide offers a comprehensive offensive security roadmap for sysadmins, penetration testers, and other security professionals.

Illustration of 3 documents next to each other

Get a leg up on your next pen test or CTF with our handy guide!

Previously introduced at DEF CON 29, “Breaking & Entering” is an easy-to-consume, user-friendly resource for sysadmins, penetration testers, and other security professionals. It delivers a comprehensive offensive security roadmap, covering every phase of an engagement from beginning to end – just what you need for your next penetration test or CTF!

Discover techniques and shortcuts for conducting OSINT and reconnaissance, host enumeration and post-exploitation, secure pivoting (tunneling), and exfiltration.

Other things you’ll find inside include:

  • Information on how Google hacking (or “Google Dorking”) can allow you to level up your OSINT efforts
  • A thorough initial list of commands for investigating a host system
  • An SMB/Kernel version chart for matching enumerated information to system versions, common registry locations
  • Useful technical documentation references like NIST publications and tunneling worksheets

Andy doering

About the author, Andy Doering

Cosmos Adversarial Operator

Andy Doering is a Cosmos Adversarial Operator with Bishop Fox's Cosmos (formerly CAST) team. Prior to his time at Bishop Fox, he served as a Non-Commissioned Officer in the U.S. Army where he worked as a Senior Exploitation Analyst and Training Lead, developing a specialization in Computer Network Operations (CNO), Digital Network Analysis (DNA), and Intelligence Surveillance and Reconnaissance (ISR).

More by Andy

Extend Your Knowledge

Check out these related resources.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.