In this article, we will learn how to get a reverse in a few easy steps. Usually, the problem when reverse shell commands is to
In this article, we’ll learn about a powerful Burp Extension cool tool called “Burp Logger++”. It is like a super detective for websites, always on
In this article, we will learn how to customise the Firefox browser for efficient pen-testing along with extensions you can use for the same purpose.
Introduction Serialization gathers data from objects, converts them to a string of bytes, and writes them to disk. The data can be deserialized and the
Introduction According to MITRE, an adversary may abuse Active Directory authentication encryption properties to gain access to credentials on Windows systems. The AllowReversiblePasswordEncryption property specifies
Background of Port forwarding Port forwarding in a computer network, also known as port mapping of network address transition (NAT), redirects a communication request from
Summary Blackfield is a windows Active Directory machine and is considered as hard box by the hack the box. This box has various interesting vulnerabilities,
Background Evil-winrm tool is originally written by the team Hackplayers. The purpose of this tool is to make penetration testing easy as possible especially in
Background Kerbrute is a tool used to enumerate valid Active directory user accounts that use Kerberos pre-authentication. Also, this tool can be used for password