In this post, you will find out how Microsoft’s LAPs feature can be abused by the attacker to get the end-user password. Table of Content
Today, I am going to share a writeup for the boot2root challenge of the Vulnhub machine “Sumo: 1”. It was an intermediate box based on
Today, I am going to share a writeup for the boot2root challenge of the Vulnhub machine “Zion: 1.1”. It was actually an intermediate box based
After working on Pass the Hash attack and Over the pass attack, it’s time to focus on a similar kind of attack called Pass the
The most of the Organisation need more than one domain controller for their Active Directory and to maintain consistency among multiple Domain controller, it is
Today we are going to solve another boot2root challenge called “DevRandom CTF:1.1”. It is available on Vulnhub for the purpose of Penetration Testing practices. This
In this post we will discuss “How the attacker uses the Microsoft office for phishing attack to get the NTLM hashes from Windows.” Since we
In this post, we’ll discuss how an attacker uses the ccache file to compromise kerberos authentication to access the application server without using a password.
CTF’s are a great way to sharpen your axe. As a security enthusiast, this is probably the best way to get some hands-on practice that