Skip to content

ActivePwns

Learn ethical hacking

  • POSTS
  • Pentesting Methodology
    • Active Directory
    • Windows PrivEsc
    • Linux PrivEsc
  • whoami

Category: Pentesting Methodology

Pass the Hash – Active Directory

May 12, 2023May 12, 2023 by abhinavdsubedi@gmail.com

What is Pass the Hash A pass the hash attack occurs when an attacker obtains the hashed password of a

Continue reading…Pass the Hash – Active Directory

Abusing SeBackupPrivilege to get hashes

May 12, 2023May 12, 2023 by abhinavdsubedi@gmail.com

What is SeBackupPrivilege SeBackupPrivilege is a Windows user privilege that grants a user the ability to bypass file and directory

Continue reading…Abusing SeBackupPrivilege to get hashes

A Guide to Tunneling: Access Restricted Networks

April 11, 2023April 25, 2023 by abhinavdsubedi@gmail.com

Note: The explanation for most of the commands are written in the “Extras” section Tunneling is a technique used to

Continue reading…A Guide to Tunneling: Access Restricted Networks

Copyright © 2025 ActivePwns | Bold Photography by Catch Themes
Cleantalk Pixel Scroll Up Scroll Up