Skip to content

Hacking Articles

Raj Chandel’s Blog

  • Courses We Offer
  • CTF Challenges
  • Penetration Testing
  • Web Penetration Testing
  • Red Teaming
  • Donate us
Domain Escalation

Abusing BadSuccessor (dMSA): Stealthy Privilege Escalation

BadSuccessor (dMSA) is a dangerous vulnerability in Windows Active Directory that allows attackers to achieve domain admin access through privilege escalation. By exploiting misconfigurations in

Cloud Security

AWS: Abusing IAM Policy Version

This post explores a specific issue in AWS IAM—policy versioning. If not configured properly, it can be exploited by rolling back the default policy to

Active Directory Certificate Attack

ADCS ESC16 – Security Extension Disabled on CA (Globally)

The ESC16 vulnerability in AD CS allows attackers to bypass certificate validation and escalate privileges through misconfigured templates, UPN mapping, and shadow credentials. This can

Cloud Security

AWS: IAM CreateAccessKey Privilege Escalation

While cloud providers are responsible for securing the cloud infrastructure, customers are accountable for securing everything they deploy in the cloud, including proper configurations. In

Cloud Security

AWS: IAM AssumeRole Privilege Escalation

As more and more organizations are relying on cloud services, it becomes critical to understand the complexity of the cloud environments and misconfigurations that can

Active Directory Certificate Attack

ADCS ESC15 – Exploiting Template Schema v1

The ESC15 vulnerability (EKUwu), affects Active Directory Certificate Services (AD CS), allowing attackers to inject unauthorized EKUs (e.g., Client Authentication) into Schema Version 1 templates.

Red Teaming

Kerberoasting Attack in Active Directory

This article explores Kerberoasting, a stealthy attack in Active Directory that exploits Service Principal Names (SPNs) to extract and crack TGS ticket hashes, revealing service

Active Directory Certificate Attack

ADCS ESC14 – Write access on altSecurityIdentities

ESC14 targets weak certificate mapping in Active Directory, exploiting the altSecurityIdentities attribute to allow attackers to spoof Subject CN or Issuer DN fields. This enables

Active Directory Certificate Attack

ADCS ESC11 – Relaying NTLM to ICPR

ESC11 (Enterprise Security Control 11) represents a sophisticated attack path targeting Active Directory Certificate Services (AD CS), exploiting a dangerous combination of vulnerabilities. This advanced

Posts pagination

Previous 1 … 3 4 5 … 155 Next

Categories

© All Rights Reserved 2024 Theme: Prefer by Template Sell.