Malek AlthubianyBuffer Over Flow in 5 minutes.In a Buffer Overflow (BoF) attack, the Extended Instruction Pointer (EIP) and Extended Stack Pointer (ESP) play crucial roles in…Aug 10Aug 10
Malek AlthubianyUnauthorized Access via Silver Ticket AttackFinding Name: Unauthorized Access via Silver Ticket AttackAug 10Aug 10
Malek AlthubianyReal-World Kerberoasting ScenarioScenario: You are a penetration tester hired to assess the security of a company’s Active Directory environment. The company uses Kerberos…Aug 10Aug 10
Malek AlthubianyAS-REP Roasting Attack: Penetration Test FindingFinding: Kerberos Preauthentication DisabledAug 10Aug 10
Malek AlthubianyHow Kerberos server Works In simple1. User Login & AS-REQ (Authentication Server Request)Aug 8Aug 8
Malek AlthubianyUID and GID in Executing a BinaryUID and GID in Executing a Binary | | — 1. Definitions | | — a. UID (User ID) | | | — Unique identifier for a user | | | — Determines file…Jul 18Jul 18
Malek AlthubianyWindows Prevleige Escaltion using A vulnerable ServiceIntroduction: Windows Privilege Escalation Using a Vulnerable ServiceJul 10Jul 10
Malek AlthubianyUnmasking Hidden Secrets: Enumerating Windows CredentialsUnmasking Hidden Secrets: A Penetration Testing EngagementJul 7Jul 7