Splunk Inc. is an American public multinational corporation based in San Francisco, California, that produces software for searching, monitoring, and analyzing machine-generated big data via a Web-style interface. Splunk (the product) captures,
MISP is an open-source Threat intelligence and sharing platform (formerly known as Malware Information Sharing Platform) that is used for collecting, storing distributing and sharing
Today, in this article, we will focus on various methods that attackers implement to evade detection by hiding artifacts in the victim’s system to execute
In this post, we are going to discuss how we can abuse Kerberos protocol remotely using Python libraries “Impacket” for conducting the lateral movement attack.
In this post, we are going to discuss how we can connect to Victims machine remotely using Python libraries “Impacket” which you can download from
In our previous post, we explained the Kerberoasting attack in detail, which you can read from here. I recommend, then, to revisit our previous article
In this post, we are going to discuss the domain cache credential attack and various technique to extract the password hashes by exploiting domain user.
In this article, we will be discussing the concept of Credential Dumping and LAPS (Local Administrator Password Solution). We will delve into the world of
After working on Pass the Hash attack and Over the pass attack, it’s time to focus on a similar kind of attack called Pass the