In this post, we are going to discuss how we can abuse Kerberos protocol remotely using Python libraries “Impacket” for conducting the lateral movement attack.
When many people around were fighting the good fight for Net Neutrality, talented people over Dell SecureWorks Counter Threat Unit or CTU discovered a malware
In the previous article, we had explained Forge Kerberos Ticket “Domain Persistence: Golden Ticket Attack” where have discussed how the Kerberos authentication process works and
In this article, we will dump the windows login credentials by exploiting SSP. This is our fourth article in the series of credential dumping. Both
Introduction Secure Shell (SSH) is a cryptographic protocol that provides secure communication over an unsecured network. It is a secure alternative to the non protected
In this article, we are going to describe the utility of the BITSAdmin tool and how vital it is in Windows Penetration Testing. BITSAdmin is
In this article, we will learn how to open the magic box of ethical hacking. Can you guess the name of that box? Ok, I
Recently, I had the pleasure and honour of receiving an invitation to add my review for the Hands-on Red Team Tactics – A Red Team
In this post you will get to know all about RED TEAM Operation and Practice, idea for this article came from the SANS SEC564 by