Active Directory Credential Dumping DCSync Attack is a specialized technique used by attackers to extract credentials from a domain controller (DC) by simulating the behavior
Today we are going to solve another boot2root challenge called “DevRandom CTF:1.1”. It is available on Vulnhub for the purpose of Penetration Testing practices. This
In this post we will discuss “How the attacker uses the Microsoft office for phishing attack to get the NTLM hashes from Windows.” Since we
In this post, we’ll discuss how an attacker uses the ccache file to compromise kerberos authentication to access the application server without using a password.
CTF’s are a great way to sharpen your axe. As a security enthusiast, this is probably the best way to get some hands-on practice that
Today, I am going to share a writeup for the boot2root challenge of the vulnhub machine “Cengbox:1”. It was an easy box based on the
TBBT2 is made by emaragkos. This boot2root machine is part of the TBBT Fun with Flags series and it is themed after the famous TV
Today we deal with the technique that at first sounds very much similar to Bruteforcing but trust me, it is not brute-force. It is Password
Today, I am going to share a writeup for the boot2root challenge of the vulnhub machine “GEISHA”. It was actually an easy box based on