Aayush PareekAbusing ZeroLogon (CVE-2020–1472)In this attack we are capable of attacking the domain controller, setting the password to null, and then taking over the Domain Controller.Sep 5, 2022Sep 5, 2022
Aayush PareekSetting up my Active Directory Homelab in VMware with 1 DC and 2 host machines which I’ll be using…Setting up my Active Directory Homelab in VMware with 1 DC and 2 host machines which I’ll be using to experiment and understand different…Sep 2, 2022Sep 2, 2022
Aayush PareekActive Directory: Post-Compromise Attack — URL File Attack against Writable ShareWhen the user opens a file share and sees our file it automatically sends us there hash without user interaction.Aug 30, 2022Aug 30, 2022
Aayush PareekAttacking Active Directory: Post-Compromise Attack s— Kerberoasting AttackKerberoasting can be an effective method for extracting service account credentials from Active Directory as a regular user without…Aug 29, 2022Aug 29, 2022
Aayush PareekActive Directory: Post-Compromise Attacks — Token Impersonation AttackToken Impersonation is a post-exploitation attack we need to first have local administrator access to the device for the attack to work.Aug 27, 2022Aug 27, 2022
Aayush PareekActive Directory: Post-Compromise Attacks — Pass the Hash / Password AttacksPass-the-Password attack is a technique whereby an attacker captures a password hash and crack it then simply passes it through for…Aug 5, 2022Aug 5, 2022
Aayush PareekActive Directory: Initial Attack Vector — DNS Takeover via IPv6 Attack and DefenseIf we think about a machine running on a Windows network we typically run on IPv4, chances are the network is not even utilizing IPv6 but…Jul 29, 2022Jul 29, 2022
Aayush PareekAttacking Active Directory: Initial Attack Vector — SMB Relay AttacksSMB is commonly used for sharing files, printers and communication between client and server.Jul 13, 2022Jul 13, 2022
Aayush PareekActive Directory: Initial Attack Vector — LLMNR poisoning Attack and DefenseLink-Local Multicast Name Resolution (LLMNR) and NetBIOS Name Service (NBT-NS) are Microsoft Windows components that serve as alternate…Jul 13, 2022Jul 13, 2022
Aayush PareekHack The Box — Blue (Exploiting MS17–010)The following write up is for a machine labeled “Blue”. Blue is a Easy rated Windows machine on Hack The Box. We use the popular Eternal…May 27, 2022May 27, 2022