In this article, we will discuss kerberoasting attacks and other multiple methods of abusing Kerberos authentication. But before that, you need to understand how Kerberos authentication
WMI is used for a lot of stuff, but it can also be used for Lateral Movement around the network. This can be achieved using
In this article, we will learn to mimic an authentic SSL certificate to bypass various security measures taken by the target. It will also ensure
In this article, we will comprehend the working of DNSteal with a focus on data exfiltration. You can download this tool from here. Table of
When many people around were fighting the good fight for Net Neutrality, talented people over Dell SecureWorks Counter Threat Unit or CTU discovered a malware
In the previous article, we had explained Forge Kerberos Ticket “Domain Persistence: Golden Ticket Attack” where have discussed how the Kerberos authentication process works and
In this article, we will learn to hijack an RDP session using various methods. This is a part of Lateral movement which is a technique
In this article, you will learn how Windows Server stores passwords in the NTDS.dit file and then how to dump these credential hashes from this
In this article, we will dump the windows login credentials by exploiting SSP. This is our fourth article in the series of credential dumping. Both