PinnedMr JokarinSystem WeaknessALL about OSCP Pivoting| AD Lateral Movement | ligolo-ng, chisel, sshuttleThe new Active Directory part of the OSCP has been a grind for everyone. The freshest question arises in one’s mind who has done CTFs and…12 min read·Aug 5, 2023--1--1
Mr JokarinSystem WeaknessDifference between NT, LM, NTLM, Net-NTLMv1/v2, NTLMv1/v2 HashesWhile learning to pentest windows and Active Directory, it’s a common confusion to have between all these hashes specially with the very…4 min read·Aug 22, 2023--2--2
Mr JokarinSystem WeaknessKnow your SSH Algorithm to never miss the LFI to RCE win!Here’s a simple yet interesting technique about enumerating SSH keys.1 min read·Aug 18, 2023----
Mr JokarinSystem WeaknessHow to BREAKOUT of rbash (Restricted Bash)So you have popped a shell but surprise surprise, you can’t do much. By much I mean a lot ! You can’t execute most of the commands, maybe…6 min read·Jul 11, 2023----
Mr JokarinSystem Weakness“Bookstore” WriteUp | TryHackMe | API Hacking & Reverse EngineeringIn simple words, API is the connector between services or applications. When you order food from xyz company and can constantly check where…11 min read·Jul 5, 2023----
Mr JokarinSystem WeaknessThings you SHOULD know before taking PNPT by TCM SecurityI have recently passed the PNPT exam by TCM Security. It was my first certification and I enjoyed every moment of the journey. This post…6 min read·Jun 15, 2023--3--3
Mr JokarinSystem WeaknessHow to Attack Login Portals ? Initial Access for Pentesters & Red TeamersFor any external pentests or red team operation, initial access in the network is the first big step. You need a way to let yourself in…7 min read·May 15, 2023--1--1
Mr JokarinSystem WeaknessTrack Anyone with just a Phone Number | OSINT InvestigationYou can be an OSINT Investigator, CTF Player or simply someone who is getting spam calls. Someone who is trying to verify the number you…4 min read·May 14, 2023--2--2
Mr JokarinSystem Weaknessc“Holo Network” WriteUp | TryHackMe | Let’s Hack Active Directory NetworkHere we have an entire Active Directory Network to compromise. Our assignment is to be as stealthy as possible and hack our way into the…54 min read·May 10, 2023----
Mr JokarinSystem WeaknessRemote NTLM Relay Attack | Relay through a ProxySo SMB Relay Attack or NTLM Hash relaying is a well known attack in Active Directory environment. You set up something that listens for…5 min read·May 10, 2023--2--2