Attacking and Defending Active Directory Part I
Reading Time: 3 minutes Introduction Microsoft Active Directory is one of the most interesting services to attack since we can gather a lot of information …
Reading Time: 3 minutes Introduction Microsoft Active Directory is one of the most interesting services to attack since we can gather a lot of information …
Reading Time: 5 minutes This blog post will help you identify phishing emails and learn what are the tools being used in checking if …
Reading Time: 4 minutes This blog post contains the Networking Concepts and Protocols course that can be enrolled in Pluralsight. Feel free to skim …
Reading Time: 4 minutes Introduction As your organization grows, a lot more log collectors either commercial or freeware are needed to be installed on …
Reading Time: 6 minutes This is a write-up of the retired Optimum box on Hack the Box. First thing I did was to fire …
Reading Time: 5 minutes The slack bot that I will be building has a feature that will automatically fetch the latest tweets from my …
Reading Time: 7 minutes This post contains the actual commands that I used in hacking and getting the user and root hashes on HTB …
Reading Time: 9 minutes The SkyDogConCTF is one of the most enjoyable CTF challenges that I have ever played because it contained a lot of …
Reading Time: 5 minutes Started with the Nmap Scan # Nmap 7.40 scan initiated Thu Aug 3 20:58:47 2017 as: nmap -sC -sV -oA …
Reading Time: 3 minutes Penetration Testing or Pentesting is a process where the testers will assess and discover the vulnerabilities that are present in …