PinnedPublished inSystem WeaknessALL about OSCP Pivoting| AD Lateral Movement | ligolo-ng, chisel, sshuttleThe new Active Directory part of the OSCP has been a grind for everyone. The freshest question arises in one’s mind who has done CTFs and…Aug 5, 20231Aug 5, 20231
Published inSystem WeaknessDifference between NT, LM, NTLM, Net-NTLMv1/v2, NTLMv1/v2 HashesWhile learning to pentest windows and Active Directory, it’s a common confusion to have between all these hashes specially with the very…Aug 22, 20232Aug 22, 20232
Published inSystem WeaknessKnow your SSH Algorithm to never miss the LFI to RCE win!Here’s a simple yet interesting technique about enumerating SSH keys.Aug 18, 2023Aug 18, 2023
Published inSystem WeaknessHow to BREAKOUT of rbash (Restricted Bash)So you have popped a shell but surprise surprise, you can’t do much. By much I mean a lot ! You can’t execute most of the commands, maybe…Jul 11, 2023Jul 11, 2023
Published inSystem Weakness“Bookstore” WriteUp | TryHackMe | API Hacking & Reverse EngineeringIn simple words, API is the connector between services or applications. When you order food from xyz company and can constantly check where…Jul 5, 20231Jul 5, 20231
Published inSystem WeaknessThings you SHOULD know before taking PNPT by TCM SecurityI have recently passed the PNPT exam by TCM Security. It was my first certification and I enjoyed every moment of the journey. This post…Jun 15, 20233Jun 15, 20233
Published inSystem WeaknessHow to Attack Login Portals ? Initial Access for Pentesters & Red TeamersFor any external pentests or red team operation, initial access in the network is the first big step. You need a way to let yourself in…May 15, 20231May 15, 20231
Published inSystem WeaknessTrack Anyone with just a Phone Number | OSINT InvestigationYou can be an OSINT Investigator, CTF Player or simply someone who is getting spam calls. Someone who is trying to verify the number you…May 14, 20232May 14, 20232
Published inSystem Weaknessc“Holo Network” WriteUp | TryHackMe | Let’s Hack Active Directory NetworkHere we have an entire Active Directory Network to compromise. Our assignment is to be as stealthy as possible and hack our way into the…May 10, 20232May 10, 20232
Published inSystem WeaknessRemote NTLM Relay Attack | Relay through a ProxySo SMB Relay Attack or NTLM Hash relaying is a well known attack in Active Directory environment. You set up something that listens for…May 10, 20232May 10, 20232