This post discusses how CVE-2021-42278 allows potential attackers to gain high privileged user access (domain controllers Administrator level access) via a low privileged user (any
Socat is one of those kinds of tools that either you might not know at all, or if you know then you might know all
This article will showcase the installation, process for compromising a Windows Machine, and the various attacks and tasks that can be performed on that compromised
In this article, it’s time to explore the scenario where the attacker wants to extract the hash or credentials of the target user but cannot
In this article, we are going to focus on the enumeration of the Domain through the SMB and RPC channels. The tool that we will
In the article, we will focus on the Active Directory Enumeration tool called BloodHound. It takes the data from any device on the network and
In this article, we take a look inside Active Directory through PowerShell Empire. PowerShell Empire consists of some post-exploitation modules inside the situational awareness section.
Active Directory Enumeration is a challenge for even some of the seasoned attackers and it is easy to miss some key components and lose the
Defense Evasion is a cyber kill chain attack strategy that includes strategies used by attackers to prevent detection during their violation. MITRE TACTIC: Defenses Evasion