Socat is one of those kinds of tools that either you might not know at all, or if you know then you might know all
This article will showcase the installation, process for compromising a Windows Machine. Additionally, it will demonstrate the various attacks and tasks that users can perform
In this article, we will show how attackers can escalate privileges from DNSAdmins to Domain Admin in Windows environments and gain unauthorized access. We will
In this article, we are going to focus on the enumeration of the Domain through the SMB and RPC channels. The tool that we will
In the article, we will focus on the Active Directory Enumeration tool called BloodHound. It takes the data from any device on the network and
In this article, we take a look inside Active Directory through PowerShell Empire. PowerShell Empire consists of some post-exploitation modules inside the situational awareness section.
In this guide, we will explore how to perform Active Directory enumeration using PowerView, a powerful tool within PowerShell. PowerView enables penetration testers and security
In this post, we explore Windows Event Logging defense evasion techniques used by attackers to avoid detection. By disabling, bypassing, or tampering with event logs
This article will showcase various attacks and tasks that can be performed on a compromised Windows Machine which is a part of a Domain Controller