|
You are here |
www.securitynik.com | ||
| | | | |
0xdf.gitlab.io
|
|
| | | | | Active was an example of an easy box that still provided a lot of opportunity to learn. The box was centered around common vulnerabilities associated with Active Directory. There's a good chance to practice SMB enumeration. It also gives the opportunity to use Kerberoasting against a Windows Domain, which, if you're not a pentester, you may not have had the chance to do before. | |
| | | | |
passing-the-hash.blogspot.com
|
|
| | | | | So one of my favorite techniques on the Windows side is to use what Benjamin Delpy (@gentilkiwi) called 'overpass the hash' to get a legit K... | |
| | | | |
blog.xpnsec.com
|
|
| | | | | In this post we will be exploring another "roasting" method which involves exploiting a weak account configuration setting in Active Directory.. AS-REP Roasting. | |
| | | | |
gist.github.com
|
|
| | | Generic `printf` implementation in Idris2. GitHub Gist: instantly share code, notes, and snippets. | ||