|
You are here |
siunam321.github.io | ||
| | | | |
johnjhacking.com
|
|
| | | | | OSCP Reborn - 2023 Exam Preparation Guide Prologue Many of you are likely aware that the Offensive Security Certified Professional Exam was revised, with the changes officially published on January 11, 2022. The old version of the exam required the student to perform a buffer overflow attack (it still may end up on your exam, but is not a guarantee). Since then, the model has shifted towards an active directory model which is more aligned with modern day penetration testing.... | |
| | | | |
blog.ikuamike.io
|
|
| | | | | Introduction After passing my OSCP, I am planning on doing CRTP and CRTO sometime this year. I took the OSCP exam before the updates that are focused on Active Directory so I didn't actively focus on this area. So to learn and practice on AD and Windows and also as some prep for the certifications I plan on taking, I will be doing some machines that are AD related and try to get into the details of the included misconfigurations and vulnerabilities. | |
| | | | |
taeluralexis.com
|
|
| | | | | Exploit a machine through SMB and elevate privileges by performing a kerberoasting attack on a domain admin. | |
| | | | |
www.zerodayinitiative.com
|
|
| | | [AI summary] A critical remote code execution vulnerability in SolarWinds Access Rights Manager allows attackers to execute arbitrary code with service account privileges if proper data validation is not enforced. | ||