Sanskar KalraMastering Hands-On Network Pentesting: My Journey with the Certified Network Pentester (CNPen)…In today’s fast-evolving cybersecurity landscape, hands-on experience is more critical than ever. While theoretical knowledge can help you…Sep 11Sep 11
Sanskar KalraMastering NBT-NS & LLMNR Poisoning & NTLM Relay Attacks: A Deep Dive into Active Directory ExploitsIntroduction:Sep 10Sep 10
Sanskar KalraUnleashing BloodHound: A Guide to Dominating Active Directory EnumerationBloodHound for Active Directory Enumeration: Installation, Usage, and Advanced QueryingAug 26Aug 26
Sanskar KalraG.O.A.D: Active Directory Enumeration Tactics in Real-World SecurityIntroduction:Aug 19Aug 19
Sanskar KalraGame of Active Directory: Pentesting Strategies for Real-World SecurityIntroductionAug 16Aug 16
Sanskar KalraCracking CozyHosting: From Leaked Sessions to Root AccessIn the realm of ethical hacking, each challenge brings a unique set of puzzles to solve, and the HackTheBox machine ‘Cozyhosting’ was no…Aug 10Aug 10
Sanskar KalraSafeguarding the Future: Addressing the Risks of Hardcoded Credentials in Code RepositoriesIntroductionAug 5Aug 5
Sanskar KalraSoaring Through Cybersecurity: A Deep Dive into Hacking ‘Flight’ on HackTheBoxIn the realm of cybersecurity, each challenge presents an opportunity to enhance skills and expand knowledge. The HackTheBox platform…Aug 3Aug 3
Sanskar KalraMastering HackTheBox: Exploiting GraphQL and File Upload Vulnerabilities on ‘HELP’In this blog post, I will take you through my journey of hacking the ‘HELP’ machine on HackTheBox. This machine presented an interesting…Jul 23Jul 23
Sanskar KalraBroker Blues: How I Exploited ActiveMQ RCE and Sudo Privileges to Seize RootWelcome to the rollercoaster ride of my latest HackTheBox adventure, where I take on the elusive ‘Broker’ machine. This isn’t just any…Jul 18Jul 18