PinnedRootRoutewayHacking Active Directory: From Reconnaissance to Exploitation -Part 1Designed by FreepikJul 11Jul 11
RootRoutewayHacking Active Directory: From Reconnaissance to Exploitation -Part 2Welcome back! This blog is a continuation of my first Active Directory pentesting article. In the first part, we covered the initial steps…Jul 4Jul 4
RootRoutewayStrengthening Linux Security: Leveraging Microsoft Intune to onboard Linux workstations into…In the rapidly evolving digital landscape, where mobile devices and cloud services extend the boundaries of the workplace, securing…Jun 19Jun 19
RootRoutewayEfficiently Manage Users and Groups with Ansible: A Step-By-Step GuideEffective management of users and groups stands as an indispensable pillar in the realm of Linux Administration, exerting a pivotal…Oct 29, 2023Oct 29, 2023
RootRoutewayGetting Started with Ansible: Installation and Comprehensive Configuration GuideAnsible is an open-source automation tool that is used for configuration management and application deployment. It simplifies the process…Oct 29, 2023Oct 29, 2023
RootRoutewayDeploy your first application on the Rancher server 2.6 -From scratch-Rancher is a great open-source tool for deploying and importing clusters from cloud platforms (AWS, Azure, DgitalOcean, etc), as well as…Feb 24, 2022Feb 24, 2022