In this post we will discuss “How the attacker uses the Microsoft office for phishing attack to get the NTLM hashes from Windows.” Since we
Introduction Pass the Ccache is a credential access and lateral movement technique where an attacker steals or generates a Kerberos ccache file containing a valid TGT, then
CTF’s are a great way to sharpen your axe. As a security enthusiast, this is probably the best way to get some hands-on practice that
Today, I am going to share a writeup for the boot2root challenge of the vulnhub machine “Cengbox:1”. It was an easy box based on the
TBBT2 is made by emaragkos. This boot2root machine is part of the TBBT Fun with Flags series and it is themed after the famous TV
Today we deal with the technique that at first sounds very much similar to Bruteforcing but trust me, it is not brute-force. It is Password
Today, I am going to share a writeup for the boot2root challenge of the vulnhub machine “GEISHA”. It was actually an easy box based on
Today, we are going to shed some light on a very sticky persistence method in Windows systems. In fact, it is so persistent that it
Katana VM is made by SunCSR Team. This VM is a purposely built vulnerable lab with the intent of gaining experience in the world of