Skip to content

Newsletter

anotsodev

  • Home
  • Penetration Testing
  • Information Security
  • Hack the Box
  • Capture The Flag
  • Online Resources
  • About Me
  • Contact

anotsodev

  • Home
  • Penetration Testing
  • Information Security
  • Hack the Box
  • Capture The Flag
  • Online Resources
  • About Me
  • Contact

Penetration Testing

Attacking and Defending Active Directory Part I

April 24, 2020April 19, 2020 by anotsodev

Reading Time: 3 minutesIntroduction Microsoft Active Directory is one of the most interesting services to attack since we can gather a lot of information …

Read moreAttacking and Defending Active Directory Part I

Categories Information Security, Network Defense, Penetration Testing, Windows Tags active directory, cybersecurity, Information Security, Penetration Testing, windows

Hack the Box Optimum

April 24, 2020October 29, 2017 by anotsodev

Reading Time: 6 minutesThis is a write-up of the retired Optimum box on Hack the Box. First thing I did was to fire …

Read moreHack the Box Optimum

Categories Capture The Flag, Hack the Box, Penetration Testing, Writeups Tags hackthebox, optimum, writeup

Hack the Box Legacy Get System no Jutsu

April 24, 2020September 10, 2017 by anotsodev

Reading Time: 7 minutesThis post contains the actual commands that I used in hacking and getting the user and root hashes on HTB …

Read moreHack the Box Legacy Get System no Jutsu

Categories Capture The Flag, Hack the Box, Penetration Testing Tags hackthebox, legacy, windows, writeup

Phases of Penetration Testing

April 24, 2020August 24, 2017 by anotsodev

Reading Time: 3 minutesPenetration Testing or Pentesting is a process where the testers will assess and discover the vulnerabilities that are present in …

Read morePhases of Penetration Testing

Categories Penetration Testing Tags Information Security, Methodologies, phases
Copyright © 2025 anotsodev - Information Security Blog