Empire for Pentester: Active Directory Enumeration
In this article, we take a look inside Active Directory through PowerShell Empire. PowerShell Empire consists of some post-exploitation modules inside the situational awareness section. PowerView is...
View ArticleWindows Privilege Escalation: SeBackupPrivilege
In this article, we will shed light on some of the methods of Escalating Privilege on Windows-based Devices when it is vulnerable with the SeBackupPrivilege after getting the initial foothold on the...
View ArticleActive Directory Enumeration: BloodHound
In the article, we will focus on the Active Directory Enumeration tool called BloodHound. It takes the data from any device on the network and then proceeds to plot the graph that can help the attacker...
View ArticleWonderland TryHackMe Walkthrough
Today we’re going to solve another boot2root challenge called “Wonderland “. It’s available at TryHackMe for penetration testing practice. This lab is of medium difficultly if we have the right basic...
View ArticleWireshark for Pentester: Decrypting RDP Traffic
Over the last few years, attackers used the Remote Desktop Protocol (RDP) for accessing unsecured servers and company networks. In ransomware malware attacks since 2017, RDP has become a major vector....
View ArticleAnonymous TryHackMe Walkthrough
Today it is time to solve another challenge called “Anonymous”. It is available at TryHackMe for penetration testing practice. This challenge is of medium difficulty if you have the right basic...
View ArticleA Beginner’s Guide to Buffer Overflow
In this guide, we are going to learn about what is a buffer overflow and how it occurs? Buffer Overflow occurs by overwriting memory fragments of a process or program. Overwriting values of certain...
View ArticleActive Directory Enumeration: RPCClient
In this article, we are going to focus on the enumeration of the Domain through the SMB and RPC channels. The tool that we will be using for all the enumerations and manipulations will be rpcclient....
View ArticleWindows Privilege Escalation: DnsAdmins to DomainAdmin
In this article, we will show you a method for Escalating Privilege on Windows-based Devices when it contains a compromised user of the DnsAdmins Group.Table of Content· Introduction·...
View ArticleBoiler CTF TryHackMe Walkthrough
Today it is time to solve another challenge called “Boiler CTF”. It is available at TryHackMe for penetration testing practice. This challenge is of medium difficulty if you have the right basic...
View ArticleNTLM Downgrade Attack: Internal Monologue
In this article, it’s time to explore the scenario where the attacker wants to extract the hash or credentials of the target user but cannot use Mimikatz or any other noisy tool. This attack is called...
View ArticleBlog TryHackMe Walkthrough
Today it is time to solve another challenge called "Blog". It is available at TryHackMe for penetration testing practice. The challenge is of medium difficulty if you have the right basic knowledge and...
View ArticleWatcher TryHackMe Walkthrough
Today it is time to solve another challenge called "Watcher". It is available at TryHackMe for penetration testing practice. The challenge is of medium difficulty if you have the right basic knowledge...
View ArticleUltraTech TryHackMe Walkthrough
Today it is time to solve another challenge called "UltraTech". It is available at TryHackMe for penetration testing practice. The challenge is of medium difficulty if you have the right basic...
View ArticleDelivery HackTheBox Walkthrough
Hello! Everyone and Welcome to yet another CTF challenge from Hack the Box, called ‘Delivery,’ which is available online for those who want to increase their skills in penetration testing and Black box...
View ArticleBookstore TryHackMe Walkthrough
Today it is time to solve another challenge called “Bookstore”. It is available at TryHackMe for penetration testing practice. This challenge is of medium difficulty if you have the right basic...
View ArticlePickle Rick TryHackMe Walkthrough
Today it is time to solve another challenge called “Pickle Rick”. It is available at TryHackMe for penetration testing practice. The challenge is of easy difficulty if you have the right basic...
View ArticleTime HackTheBox Walkthrough
Hello! Everyone and Welcome to yet another CTF challenge from Hack the Box, called ‘Time,’ which is available online for those who want to increase their skills in penetration testing and Black box...
View ArticleReady HackTheBox Walkthrough
Hello! Everyone and Welcome to yet another CTF challenge from Hack the Box, called ‘Ready,’ which is available online for those who want to increase their skills in penetration testing and Black box...
View ArticleAnonymous Logins for Pentesters
In this article we will focus on the various services that support the Anonymous Logins. We will be understanding the process to setup those service on your local target system and then using Kali...
View Article