In the previous article we learned about Enumeration, Information Gathering, Call Spoofing. We introduced a little about the Asterisk Server. This time we will focus
In this article, we will comprehend the working of DNSteal with the focus on data exfiltration. You can download this tool from here. Table of
When the many people around were fighting the good fight for Net Neutrality, talented people over Dell SecureWorks Counter Threat Unit or CTU discovered a
In the previous article, we had explained Forge Kerberos Ticket “Domain Persistence: Golden Ticket Attack” where have discussed how Kerberos authentication process and what its
Golden Ticket attack is a famous technique of impersonating users on an AD domain by abusing Kerberos authentication. As we all know Windows two famous
In this article, we will learn to hijack an RDP session using various methods. This is a part of Lateral movement which is a technique
In this article, we learn about online password mangers and dumping the credentials from such managers via clipboard. Passwords are not easy to remember especially
In this article, we are going to describe the ability of the Netsh process to provide persistent access to the Target Machine. Table of Content
LSA and LSASS stands for “Local Security Authority” And “Local Security Authority Subsystem (server) Service”, respectively The Local Security Authority (LSA) is a protected system