Today, we are going to shed some light on a very sticky persistence method in Windows systems. In fact, it is so persistent that it
Katana VM is made by SunCSR Team. This VM is a purposely built vulnerable lab with the intent of gaining experience in the world of
In this post, we’re going to talk about Over Pass the hash that added another step in passing the hash. Pass the hash is an
If you have been in the Information Security domain anytime in the last 20 years, you may have heard about Pass-the-Hash or PtH attack. It
Today, I am going to share a writeup for the boot2root challenge of the HacktheBox machine “OPENADMIN” which is a retired machine. It was actually
In this post, we delve into the exploitation of Kerberos accounts with pre-authentication disabled, commonly known as AS-REP Roasting. Specifically, this attack targets user accounts
In this article, we learn to use crackmapexec. This tool is developed by byt3bl33d3r. I have used this tool many times for both offensive and
There have been many Red Team scenarios, Capture the Flag challenges where we face the Windows Server. After exploiting and getting the initial foothold in
In this article, we will discuss kerberoasting attacks and other multiple methods of abusing Kerberos authentication. But before that, you need to understand how Kerberos authentication