This article presents a hands-on walkthrough demonstrating multiple real-world techniques to remotely enable RDP on a Windows Server 2019 Domain Controller (DC.ignite.local, 192.168.1.11) and subsequently
This article walks through SSH tunnelling in a practical, lab‑oriented way. You will see how to set up a loopback‑bound Apache2 web server as a
In the contemporary digital world, penetration testing and red team engagements, direct access to target systems from the attacker’s machine is uncommon. Many services are
This article provides a detailed net rpc operations performed against the ignite.local domain (DC: 192.168.1.11). Introduction Active Directory (AD) is the backbone of identity and
In modern penetration testing, gaining an initial foothold on an internet-facing machine is rarely the end goal. The most sensitive assets — databases, domain controllers,
Executive Summary This report documents a comprehensive Active Directory (AD) enumeration exercise conducted against the ignite.local domain. Using pywerview, a Python-based port of the PowerView
In Active Directory environments, delegation abuse via NTLM reflection is a common attack technique. Attackers exploit misconfigured delegation settings to reflect NTLM authentication back to
Overview Dynamic Link Libraries (DLLs) are shared code modules on Microsoft Windows that can be loaded and executed at runtime by host processes. Because DLL
Kerberos Constrained Delegation (KCD) is one of the most powerful and frequently abused features in Microsoft Active Directory environments. When an administrator configures a service