Return is a Windows machine on HTB and is rated as easy, this box is designed over windows that have Weak Service Permission. If summarized,
This article talks about Trivy, which is a simple and comprehensive vulnerability scanner for containers and other artifacts, suitable for Continuous Integration and Testing. Table
Mimikatz for Pentester: Kerberos is a powerful tool used in penetration testing to exploit vulnerabilities in the Kerberos authentication protocol. In this article, we will
Caldera is an open-source framework that assists in Red Team Emulation. This tool is invaluable for conducting adversary simulations based on the MITRE ATT&CK framework,
This research article documents a complete Active Directory domain compromise achieved through the abuse of Kerberos Unconstrained Delegation. Starting with a low-privileged domain user account
Benjamin Delpy (the creator of mimikatz) introduced the silver ticket attack in Blackhat 2014 in his abusing Kerberos session. An attacker forges silver tickets or
Rubeus is a C# toolkit for Kerberos interaction and abuse. Kerberos, as we all know, is a ticket-based network authentication protocol used in Active Directories.
Johnny Shaw demonstrated a defense evasion technique known as process herpaderping in which an attacker is able to inject malicious code into the mapped memory
Hello! Pentesters, this article is about a brute-forcing tool Hydra. Hydra is one of the favourite tools of security researchers and consultants. Being an excellent