Paper is regarded as a simple box, or hackthebox, that runs Linux. We’ll start with a simple port scan on this box and proceed laterally.
Hack the box considers Pandora, a Linux computer, to be a simple box, but it isn’t. Instead of depending just on TCP port results, we
The driver is an easy-rated Windows box on the HackTheBox platform. This is designed to understand initial exploitation using an SCF file and further escalate
Timelapse is an HTB Active Directory machine that is an easy machine but as the concept of initial compromise is unique, therefore, I believe it
Return is a Windows machine on HTB and is rated as easy, this box is designed over windows that have Weak Service Permission. If summarized,
This article talks about Trivy, which is a simple and comprehensive vulnerability scanner for containers and other artifacts, suitable for Continuous Integration and Testing. Table
Mimikatz for Pentester: Kerberos is a powerful tool used in penetration testing to exploit vulnerabilities in the Kerberos authentication protocol. In this article, we will
Caldera is an open-source framework that assists in Red Team Emulation. This tool is invaluable for conducting adversary simulations based on the MITRE ATT&CK framework,
Post-Windows 2000, Microsoft introduced an option where users could authenticate to one system via Kerberos and work with another system. The delegation option makes this