PinnedOUMA SYDEN (CYB3RAG3NT12)COMMON WINDOWS CMD COMMANDSHere are some common commands used in the Command Prompt (CMD) on Windows:Apr 29Apr 29
OUMA SYDEN (CYB3RAG3NT12)Lateral movement and on-prem NT hash dumping with Microsoft Entra Temporary Access PassesTemporary Access Passes are a method for Microsoft Entra ID (formerly Azure AD) administrators to configure a temporary password for user…May 6May 6
OUMA SYDEN (CYB3RAG3NT12)How to harvest logins, usernames, and passwords using Credential Harvester Attack.A credential harvester attack is a type of cyberattack in which the malicious actor acquires sensitive information. Generally, this…May 4May 4
OUMA SYDEN (CYB3RAG3NT12)Telnet Enum — 23Telnet is a protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communication…Apr 28Apr 28
OUMA SYDEN (CYB3RAG3NT12)MSSQL Enumeration(1433)MSSQL is Microsoft SQL Server for database management mainly for the windows-based system. SQL servers generally use port 1433 but you may…Apr 28Apr 28
OUMA SYDEN (CYB3RAG3NT12)Dumping Domain Controller Hashes via wmic and Vssadmin Shadow CopyThis quick labs hows how to dump all user hashes from the DC by creating a shadow copy of the C drive using vssadmin — remotely.Apr 28Apr 28
OUMA SYDEN (CYB3RAG3NT12)Empire Shells with NetNLTMv2 RelayingThis lab will perform a NetNLTM authentication relay attack where a victim1 host will try to authenticate to our attacking system, which…Apr 28Apr 28
OUMA SYDEN (CYB3RAG3NT12)Understanding the TCP Three-Way Handshake: A Fundamental Pillar of Internet Communication.In the intricate web of the internet, where data travels at the speed of light, there’s a silent dance that happens every time your device…Apr 19Apr 19
OUMA SYDEN (CYB3RAG3NT12)Stuxnet explained: The first known cyberweaponThanks to Stuxnet, we now live in a world where code can destroy machinery and stop (or start) a war.What is Stuxnet?Apr 16Apr 16