PinnedPankaj AdityaVulnerability Capstonehttps://tryhackme.com/room/vulnerabilitycapstoneJul 22, 2022Jul 22, 2022
PinnedPankaj AdityaMetasploit: IntroductionAn introduction to the main components of the Metasploit Framework.Jul 23, 2022Jul 23, 2022
PinnedPankaj AdityaMain Components of MetasploitRef: https://tryhackme.com/room/metasploitintroJul 23, 2022Jul 23, 2022
Pankaj AdityaPrivilege Escalation: Abusing dangerous privileges | SeImpersonate/SeAssignPrimaryTokenTHM | Windows Privilege EscalationSep 14, 2022Sep 14, 2022
Pankaj AdityaPrivilege Escalation: Abusing dangerous privileges | SeTakeOwnershipTHM | Windows Privilege EscalationSep 14, 2022Sep 14, 2022
Pankaj AdityaPrivilege Escalation: Abusing dangerous privileges | SeBackup / SeRestoreTHM | Windows Privilege EscalationSep 14, 20221Sep 14, 20221
Pankaj AdityaPrivilege Escalation: Abusing Service Misconfigurations | Insecure Service PermissionsTHM | Windows Privilege EscalationSep 7, 20221Sep 7, 20221
Pankaj AdityaPrivilege Escalation: Abusing Service Misconfigurations | Unquoted Service PathsTHM | Windows Privilege EscalationSep 7, 2022Sep 7, 2022