Phyo WaThone WininInfoSec Write-upsFull Lab Notes of Pass-the-Hash for Active Directory PentestingAs a basic Active Directory (AD) pentester, I know you may find it challenging to differentiate between Pass-the-Hash (PtH) and…Aug 22Aug 22
Phyo WaThone WininInfoSec Write-upsCreating a Vulnerable Active Directory Lab for Active Directory Penetration TestingVulnerable Active Directory (AD) refers to an Active Directory environment that is intentionally configured or set up with weaknesses…Aug 20Aug 20
Phyo WaThone WininOSINT TeamLocal Privilege Escalation Exercise for Active Directory Penetration TestingIntroductionAug 15Aug 15
Phyo WaThone WininInfoSec Write-upsDomain Enumeration with PowerShell| Active Directory Penetration TestingIntroductionJul 26Jul 26
Phyo WaThone WinAPI Pentesting Series — Type of APIIt is a set of rules and protocols for building and interacting with software applications. APIs allow different software systems to…Jul 6Jul 6
Phyo WaThone WininOSINT TeamMobile Capture the Flag (CTF) with Beetlebug Vulnerable APKCapture the Flag (CTF) competitions are an excellent way for cybersecurity enthusiasts to hone their skills in a practical, hands-on…Jul 5Jul 5
Phyo WaThone WinVulnerability Scanning for Android Application with Vooki (Yaazhini)IntroductionJun 30Jun 30
Phyo WaThone WininOSINT TeamLearn Android Penetration Testing Skill with This Vulnerable APKIn the realm of cybersecurity, pentesting (penetration testing) is a critical skill that helps identify and mitigate vulnerabilities in…Jun 26Jun 26
Phyo WaThone WininOSINT TeamSensitive Information, Endpoint, Hardcode Finding in Android PentestingIn the context of Android pentesting (penetration testing), hardcoding refers to embedding sensitive information or configuration data…Jun 23Jun 23