Harikrishnan PDomain Trust Relationships AbuseThis lab will familiarize you with some of the concepts in Cobalt Strike and its modules, as well as Active Directory concepts such as…Jun 9Jun 9
Harikrishnan PRelay Attack on SMBAn SMB Relay attack is a type of man-in-the-middle (mitm) attack that allows attackers to relay captured hashes to another machine on the…Aug 6, 2023Aug 6, 2023
Harikrishnan PUnconstrained Delegation in Active Directory: Convenience vs. SecurityActive Directory is a fundamental component of Windows-based networks, managing user authentication and access to various resources. Within…Jul 29, 2023Jul 29, 2023
Harikrishnan PResource-Based Constrained Delegation: Enhancing Access Control in Active DirectoryAccess control is a critical component of network security because it prevents unauthorised access to important resources. Microsoft’s…Jul 17, 2023Jul 17, 2023
Harikrishnan PConstrained DelegationWhat is Constrained Delegation? Constrained Delegation is a feature in Active Directory that allows a service to impersonate a user’s…Jul 16, 2023Jul 16, 2023
Harikrishnan PDeep Dive Into Kerberos AuthenticationIn today’s interconnected world, ensuring the security of our digital systems is of utmost importance. One key aspect of this security is…Jul 8, 2023Jul 8, 2023
Harikrishnan PUnderstanding NTDS.DIT: The Core of Active DirectoryintroductionJun 30, 20231Jun 30, 20231