Attacking and Defending Active Directory Part I
Reading Time: 3 minutesIntroduction Microsoft Active Directory is one of the most interesting services to attack since we can gather a lot of information …
Reading Time: 3 minutesIntroduction Microsoft Active Directory is one of the most interesting services to attack since we can gather a lot of information …
Reading Time: 5 minutesThis blog post will help you identify phishing emails and learn what are the tools being used in checking if …
Reading Time: 4 minutesThis blog post contains the Networking Concepts and Protocols course that can be enrolled in Pluralsight. Feel free to skim …
Reading Time: 4 minutesIntroduction As your organization grows, a lot more log collectors either commercial or freeware are needed to be installed on …
Reading Time: 6 minutesThis is a write-up of the retired Optimum box on Hack the Box. First thing I did was to fire …
Reading Time: 5 minutesThe slack bot that I will be building has a feature that will automatically fetch the latest tweets from my …
Reading Time: 7 minutesThis post contains the actual commands that I used in hacking and getting the user and root hashes on HTB …
Reading Time: 9 minutesThe SkyDogConCTF is one of the most enjoyable CTF challenges that I have ever played because it contained a lot of …
Reading Time: 5 minutesStarted with the Nmap Scan # Nmap 7.40 scan initiated Thu Aug 3 20:58:47 2017 as: nmap -sC -sV -oA …
Reading Time: 3 minutesPenetration Testing or Pentesting is a process where the testers will assess and discover the vulnerabilities that are present in …