Explore >> Select a destination


You are here

taeluralexis.com
| | blog.cryptographyengineering.com
3.5 parsecs away

Travel
| | I learn about cryptographic vulnerabilities all the time, and they generally fill me with some combination of jealousy ("oh, why didn't I think of that") or else they impress me with the brilliance of their inventors. But there's also another class of vulnerabilities: these are the ones that can't possibly exist in important production software,...
| | 0xdf.gitlab.io
1.8 parsecs away

Travel
| | Active was an example of an easy box that still provided a lot of opportunity to learn. The box was centered around common vulnerabilities associated with Active Directory. There's a good chance to practice SMB enumeration. It also gives the opportunity to use Kerberoasting against a Windows Domain, which, if you're not a pentester, you may not have had the chance to do before.
| | blog.ikuamike.io
2.6 parsecs away

Travel
| | Introduction After passing my OSCP, I am planning on doing CRTP and CRTO sometime this year. I took the OSCP exam before the updates that are focused on Active Directory so I didn't actively focus on this area. So to learn and practice on AD and Windows and also as some prep for the certifications I plan on taking, I will be doing some machines that are AD related and try to get into the details of the included misconfigurations and vulnerabilities.
| | cyberarms.wordpress.com
30.4 parsecs away

Travel
| This website is dedicated to Ethical Hacking and legal Penetration Testing. All information on this website is for educational use only. By using this website you agree to never attempt to use these techniques on or against systems that you do not own, or have express permission to do so. Doing so is illegal and...