Homepage
Open in app
Sign in
Get started
Web Security
Cloud Security
Active Directory
Network Security
Wireless
Archive
About
GitHub
Active Directory Series
Domain Enumeration with Active Directory PowerShell Module
Domain Enumeration with Active Directory PowerShell Module
Post-exploitation enumeration of windows domain controller with PowerShell
Nairuz Abulhul
May 1, 2021
DLL Injection Over SMB Service
DLL Injection Over SMB Service
Privilege Escalation & Defense Evasion — MITRE ATT&CK (T1055)
Nairuz Abulhul
Jul 15, 2022
Kerberos Attacks — AS-REP Roasting
Kerberos Attacks — AS-REP Roasting
Dumping user hashes for Kerberos disabled pre-authentication accounts
Nairuz Abulhul
Jun 6, 2021
Attacking Kerberos Unconstrained Delegation
Attacking Kerberos Unconstrained Delegation
Trust this user/computer for delegation to any service
Nairuz Abulhul
Feb 8, 2022
Attacking Kerberos Constrained Delegation
Attacking Kerberos Constrained Delegation
Trust this user/computer for delegation to specified services only
Nairuz Abulhul
Mar 9, 2022
Domain Escalation with Token Impersonation
Domain Escalation with Token Impersonation
Token Impersonation with Delegation Tokens — MITRE ATT&ACK — Access Token Manipulation T1134
Nairuz Abulhul
Nov 15, 2022
Domain Takeover with PetitPotam Exploit
Domain Takeover with PetitPotam Exploit
domain escalation from a low-privileged user to a domain admin
Nairuz Abulhul
Apr 23, 2022
Breaking Domain Trusts with Forged Trust Tickets
Breaking Domain Trusts with Forged Trust Tickets
Abuse Active Directory domain trusts for privilege escalation to Enterprise Admin
Nairuz Abulhul
Feb 18, 2022
Attacking Service Accounts with Kerberoasting
Attacking Service Accounts with Kerberoasting
Forge Service Tickets (TGS) with Kerberoasting MITRE ATT&CK ID: T1558.003, Active HTB machine
Nairuz Abulhul
Feb 2, 2022
Pwning Printers with LDAP Pass-Back Attack
Pwning Printers with LDAP Pass-Back Attack
Capture credentials stored in multifunction printers — Return Machine
Nairuz Abulhul
Dec 14, 2021
Enumerating Access Controls in Active Directory
Enumerating Access Controls in Active Directory
Understanding Active Directory Controls — ACLs, ACEs, DACLs, and SACLs
Nairuz Abulhul
Jan 18, 2022
Enumerating Domain Trusts in Active Directory
Enumerating Domain Trusts in Active Directory
Understanding Active Directory trusts within domains and forests using PowerView
Nairuz Abulhul
Jan 23, 2022
Play with Hashes — Over Pass The Hash Attack
Play with Hashes — Over Pass The Hash Attack
Lateral Movement Attack in Active Directory Environment, MITRE ATT&CK — ID: T1550.00
Nairuz Abulhul
Jan 29, 2022
Quick Overview of Kerberos Authentication
Quick Overview of Kerberos Authentication
Last month, I enrolled in Pentester Academy Active Directory Bootcamp -Beginner’s Edition by Nikhil Mittal. The course covers Active…
Nairuz Abulhul
Jun 4, 2021
How to Abuse Resource-Based Constrained Delegation to Gain Unauthorized Access
How to Abuse Resource-Based Constrained Delegation to Gain Unauthorized Access
Learn how to exploit this security risk to gain unauthorized access to resources on the Active Directory domain.
Nairuz Abulhul
May 17, 2023
About R3d Buck3T
Latest Stories
Archive
About Medium
Terms
Privacy
Teams