|
You are here |
zer1t0.gitlab.io | ||
| | | | |
adsecurity.org
|
|
| | | | | ||
| | | | |
0xdf.gitlab.io
|
|
| | | | | Active was an example of an easy box that still provided a lot of opportunity to learn. The box was centered around common vulnerabilities associated with Active Directory. There's a good chance to practice SMB enumeration. It also gives the opportunity to use Kerberoasting against a Windows Domain, which, if you're not a pentester, you may not have had the chance to do before. | |
| | | | |
www.tarlogic.com
|
|
| | | | | Kerberos attacks: Kerberos brute-force, ASREPRoast, Kerberoasting, Pass the key, Pass the ticket, Silver ticket and Golden ticket explanation. | |
| | | | |
blog.orhun.dev
|
|
| | | FOSS ? Linux ? Programming | ||