PinnedAnkitsinhaAdvanced Penetration TestingPenetration testing is a crucial aspect of cybersecurity, enabling organizations to identify and address vulnerabilities in their systems…Apr 7Apr 7
PinnedAnkitsinhaExecution and Initial Access Via LolBins And LNKThis article aims to demonstrate Evasion and execution via LOLBins (Living Off the Land Binaries) and LNK files that represent…Mar 14Mar 14
AnkitsinhaFrom Initial Enumeration to Full Domain Compromise — Forestmultiple attack vectors to gain complete control over a Windows domain environment. The steps involve leveraging common misconfigurations…Sep 6Sep 6
AnkitsinhaHTB Walkthrough: HeistHeist is an easy difficulty Windows box with an portal accessible on the web server, from which it is possible to gain Cisco password…Aug 30Aug 30
AnkitsinhaHTB Walkthrough: SteamCloudSteamCloud is an easy difficulty machine. The port scan reveals that it has a bunch of Kubernetes specific ports open. We cannot not…Aug 17Aug 17
AnkitsinhaCovenant as a C2 Framework: A Step-by-Step GuideCovenant is a popular command and control (C2) framework used by security professionals for simulating adversarial attack scenarios and…Jul 31Jul 31
AnkitsinhaHTB Writeup: HeadlessHeadless is an easy-level machine rated on the HackTheBox platform. It is a Linux machine that is vulnerable to XSS and we will try to…Jul 31Jul 31
AnkitsinhaPASSWORD CAPTURE VIA PHISHINGNot all websites are compromised directly, compromising such sites require special technique. Today we are going to compromise victim’s…Apr 24Apr 24
AnkitsinhaExploit Development Basics: Simple Buffer OverflowWhile data is being moved from one place to another, buffers — regions of memory storage — reserve it momentarily. Data volumes greater…Apr 18Apr 18
AnkitsinhaA Deep Dive into EDR Bypass StrategiesIn the ever-evolving landscape of cybersecurity, Endpoint Detection and Response (EDR) solutions serve as critical defenses against…Mar 26Mar 26