Skip to content

Hacking Articles

Raj Chandel's Blog

  • Courses We Offer
  • CTF Challenges
  • Penetration Testing
  • Web Penetration Testing
  • Red Teaming
  • Donate us
Active Directory Certificate Attack

AD Certificate Exploitation: ESC1

April 6, 2025 by raj12 Min Reading

AD CS ESC1 Certificate Exploitation is a critical vulnerability in Active Directory Certificate Services. In this article, we will explores how misconfigured certificate templates can

Credential Dumping, Domain Credential

Credential Dumping: GMSA

April 6, 2025 by raj12 Min Reading

ReadGMSAPassword Attack is a technique where attackers abuse misconfigured Group Managed Service Accounts (gMSA) to retrieve their passwords. In Active Directory, ReadGMSAPassword should only be

Red Teaming

Shadow Credentials Attack

February 12, 2025 by raj16 Min Reading

To begin with, this post explores the exploitation technique known as the Shadow Credentials attack. This attack leverages the mismanagement or exploitation of Active Directory

Red Teaming

Abusing AD Weak Permission Pre2K Compatibility

February 8, 2025 by raj5 Min Reading

Pre2K Active Directory misconfigurations (short for “Pre-Windows 2000”) often stem from overlooked legacy settings in Windows environments. Common issues include enabling NTLM or SMBv1 for

Domain Enumeration, Red Teaming

AD Recon: Kerberos Username Bruteforce

January 30, 2025 by raj5 Min Reading

In this post, we explore the exploitation technique known as the Kerberos Username Bruteforce or Kerberos pre-authentication brute-force attack. This attack takes advantage of Kerberos

Credential Dumping, Domain Credential

Credential Dumping: AD User Comment

January 29, 2025 by raj8 Min Reading

In this article, we explore how attackers exploit AD user comments and attributes for password enumeration. This process helps attackers escalate their access within an

Persistence

Diamond Ticket Attack: Abusing kerberos Trust

January 27, 2025 by raj13 Min Reading

The Diamond Ticket Attack represents a sophisticated escalation in Active Directory (AD) exploitation methods, leveraging intricate flaws in Kerberos authentication and authorization mechanisms. In this

DACL Attacks

Abusing AD-DACL: AddSelf

January 8, 2025March 16, 2026 by raj10 Min Reading

This post explores AddSelf Active Directory abuse, a common misconfiguration involving Discretionary Access Control Lists (DACL). Specifically, by exploiting the AddSelf permission, attackers can escalate

Red Teaming

Active Directory Pentesting Using Netexec Tool

December 28, 2024 by raj10 Min Reading

Active Directory (AD) penetration testing is an essential part of the security assessment of enterprise networks. Moreover, the Netexec tool offers a wide range of

Posts pagination

Previous 1 … 7 8 9 … 156 Next

Categories

Join Our Training Program

Join Our Telegram Channel

Join Our Discord Channel

Cyber Security Mindmap

Follow us on Twitter

Follow us on Linkedin

© All Rights Reserved 2021 Theme: Prefer by Template Sell.