Posts by Category
Red-Teaming
using a scf file to gather hashes
SMB-SCF File Attacks(NetNTLMv2 hash(challenge) grab)
office persistence
office persistence
Windows Enumeration
Windows Enumeration
sql server setup for penetration testing
sql server setup for penetration testing
Kerberos attacks 4-golden Ticket
Kerberos attacks 4-golden Ticket
Kerberos attacks 3-Silver Ticket
Kerberos attacks 1-Silver Ticket
Kerberos attacks 2-AS-REP Roasting
Kerberos attacks 2-AS-REP Roasting
Kerberos attacks 1-Kerberoasting
Kerberos attacks 1-Kerberoasting -Offline cracking of service account passwords
Windows Credentials part-1 SAM Database
Windows Credentials-SAM Database part-1
Active Directory Domain Trust and forest Enumeration Part-3 With Powerview
Active Directory Domain Trust and forest Enumeration
Active Directory Domain Enumeration Part-2 With Powerview
enumerating the Shares,Group Policies, OUs, ACLs ,User Hunting and local groups
Active Directory Domain Enumeration Part-1 With Powerview
enumerating the Domain,users, groups, Domain controller ,computers and local groups
CTF Writeups
Back to top ↑Penetration Testing
Dump Login Passwords From Current Linux Users
Linux Post Exploitation Command List
Writeups Bug Bounty hackerone