cY83rR0H1tDetecting Python BloodHoundBloodhound is a powerful cybersecurity tool used to map and analyze Active Directory environments.Aug 16Aug 16
cY83rR0H1tinT3CHLSA Protection Bypass/DetectionIn this blog, we will discuss LSA Protection Bypassing using 3 different Methods:-Jul 25Jul 25
cY83rR0H1tDetecting Impacket Psexec.pyPsExec.py is a Python script within the Impacket collection that enables the remote execution of commands on Windows machines. In simpler…Apr 30Apr 30
cY83rR0H1tDetecting Kerberoasting using GetUserSPNs.pyIn Active Directory, Service Principal Names (SPNs) are used to identify services and applications. These SPNs are registered to user or…Apr 16Apr 16
cY83rR0H1tEvil-Winrm DetectionObjectives: Gain a basic understanding of the initial steps involved in investigating a system using the Windows Remote Management (WinRM)…Feb 27Feb 27
cY83rR0H1tGravTrack - Hack The Box RejectedIn the last 2 months, my 2 machines were rejected by Hack The Box. This is my machine GravTrack which was rejected by Hack the Box. Now, I…Sep 5, 2023Sep 5, 2023