Explore >> Select a destination


You are here

www.securitynik.com
| | lobsterpot.com.au
10.4 parsecs away

Travel
| | I don't like to write about client situations, but this one seemed worth mentioning for the sake of other people experiencing the same thing, so I asked my client for permission and they agreed. Following an on-prem server reboot, anything that tried to connect to SQL Server on that server, using Windows Authentication, was getting [...]
| | blog.ikuamike.io
9.3 parsecs away

Travel
| | Introduction After passing my OSCP, I am planning on doing CRTP and CRTO sometime this year. I took the OSCP exam before the updates that are focused on Active Directory so I didn't actively focus on this area. So to learn and practice on AD and Windows and also as some prep for the certifications I plan on taking, I will be doing some machines that are AD related and try to get into the details of the included misconfigurations and vulnerabilities.
| | 0xdf.gitlab.io
6.6 parsecs away

Travel
| | Active was an example of an easy box that still provided a lot of opportunity to learn. The box was centered around common vulnerabilities associated with Active Directory. There's a good chance to practice SMB enumeration. It also gives the opportunity to use Kerberoasting against a Windows Domain, which, if you're not a pentester, you may not have had the chance to do before.
| | www.xcitium.com
43.6 parsecs away

Travel
| Discover the essentials of Endpoint Protection, its key features, and how it safeguards your network against cyber threats. Learn more in this comprehensive guide.