In this article, we take a look inside Active Directory through PowerShell Empire. PowerShell Empire consists of some post-exploitation modules inside the situational awareness section.
In this guide, we will explore how to perform Active Directory enumeration using PowerView, a powerful tool within PowerShell. PowerView enables penetration testers and security
In this post, we explore Windows Event Logging defense evasion techniques used by attackers to avoid detection. By disabling, bypassing, or tampering with event logs
This article will showcase various attacks and tasks that can be performed on a compromised Windows Machine which is a part of a Domain Controller
Today in this article, we will be learning about the Active Directory Pentesting Lab Setup. Active Directory is Microsoft’s directory-based identity-related service developed for Windows
In this guide, we explore DNScat2 Application Layer Command and Control, a method for using DNS to establish covert communication channels. By setting up DNScat2,
In this part of our lab series, we continue exploring AlienVault End User Devices Integration by setting up Windows and Linux endpoints for centralized monitoring.
In this guide, we delve into the SIEM Lab Setup AlienVault, focusing on deploying AlienVault OSSIM to monitor system security events, assess vulnerabilities, and perform
In this article, we will learn the technique of Defense Evasion using the PowerShell Empire. PowerShell Empire is one of my favourite Post Exploitation tools