Skip to content

Hacking Articles

Raj Chandel's Blog

  • Courses We Offer
  • CTF Challenges
  • Penetration Testing
  • Web Penetration Testing
  • Red Teaming
  • Donate us
Cloud Security

AWS: Penetration Testing Lab Setup

This guide will walk you through setting up a web server with a simulated SSRF vulnerability and a Kali Linux instance on Amazon Web Services

Active Directory Certificate Attack

ADCS ESC10 – Weak Certificate Mapping

ESC10 is a powerful post-exploitation technique in Active Directory Certificate Services (ADCS) that lets attackers authenticate as any user even Domain Admins without knowing their

Active Directory Certificate Attack

ADCS ESC9 – No Security Extension

Misconfigured certificate templates, particularly those affected by ESC9, pose a critical threat to Active Directory environments. By disabling the szOID_NTDS_CA_SECURITY_EXT security extension through the CT_FLAG_NO_SECURITY_EXTENSION

Container Security, Docker Pentest, Pentest Lab Setup, Website Hacking

Web Application Pentest Lab setup Using Docker

In the world of cybersecurity, penetration testing and vulnerability assessment are crucial steps in identifying and mitigating potential security threats. With the increasing number of

Active Directory Certificate Attack, Red Teaming

A Detailed Guide on Certipy

In this Certipy Active Directory Exploitation guide, we explore how to use Certipy—an offensive and defensive toolkit designed for Active Directory Certificate Services (AD CS)—to

Active Directory Certificate Attack

ADCS ESC8 – NTLM Relay to AD CS HTTP Endpoints

ESC8 is a critical vulnerability in Active Directory Certificate Services (ADCS) that targets web enrollment interfaces, making them vulnerable to NTLM relay attacks. If HTTPS

Active Directory Certificate Attack

ADCS ESC7 – Vulnerable Certificate Authority Access Control

ESC7 is a critical security vulnerability where attackers exploit weak access controls within Certificate Authorities (CAs). By targeting key permissions like ManageCA and Manage Certificates,

Active Directory Certificate Attack

ADCS ESC6: Editf_attributesubjectaltname2

The ESC6 attack is a sophisticated privilege escalation technique that targets Active Directory Certificate Services (ADCS). By exploiting misconfigured certificate templates and overly permissive CA

Active Directory Certificate Attack

ADCS ESC5: Vulnerable PKI Object Access Control

ESC5 is a high-risk certificate attack targeting Active Directory Certificate Services (ADCS). This ADCS attack exploits insecure access to the Certificate Authority (CA)’s private key.

Posts pagination

1 2 … 151 Next

Categories

© All Rights Reserved 2024 Theme: Prefer by Template Sell.