Today we are going to solve another boot2root challenge called “DevRandom CTF:1.1”. It is available on Vulnhub for the purpose of Penetration Testing practices. This
In this post we will discuss “How the attacker uses the Microsoft office for phishing attack to get the NTLM hashes from Windows.” Since we
Pass the Ccache is a credential access and lateral movement technique where an attacker steals or generates a Kerberos ccache file containing a valid TGT, then uses
CTF’s are a great way to sharpen your axe. As a security enthusiast, this is probably the best way to get some hands-on practice that
Today, I am going to share a writeup for the boot2root challenge of the vulnhub machine “Cengbox:1”. It was an easy box based on the
TBBT2 is made by emaragkos. This boot2root machine is part of the TBBT Fun with Flags series and it is themed after the famous TV
This article walks through a complete, hands-on password-spraying workflow against a Windows Server 2019 Domain Controller (192.168.1.7, ignite.local) using a curated list of usernames (users.txt)
Today, I am going to share a writeup for the boot2root challenge of the vulnhub machine “GEISHA”. It was actually an easy box based on
Today, we are going to shed some light on a very sticky persistence method in Windows systems. In fact, it is so persistent that it