Kerberoasting – Active Directory
Kerberoasting is a method used to extract password hashes of Active Directory service accounts, which are often used for running
Learn ethical hacking
Kerberoasting is a method used to extract password hashes of Active Directory service accounts, which are often used for running
What is Pass the Hash A pass the hash attack occurs when an attacker obtains the hashed password of a
What is SeBackupPrivilege SeBackupPrivilege is a Windows user privilege that grants a user the ability to bypass file and directory
Scheduled tasks are automated tasks that run on a predefined schedule or in response to a specific event on a
Created with DALL-E What you’ll learn What are Cronjobs Cronjobs are a way to schedule tasks to be executed automatically
Autorun applications in Windows are programs or processes that are set to run automatically when the operating system starts up.
Windows registry contains important configuration information and settings for the system, applications, and users. If the permissions on certain registry
Continue reading…Insecure Registry Permissions – Windows PrivEsc
Note: The explanation for most of the commands are written in the “Extras” section Tunneling is a technique used to
Continue reading…A Guide to Tunneling: Access Restricted Networks
Suppose you have gained access to a Windows machine through hacking and discovered that it is connected to an internal
As we rely more and more on technology, it’s become crucial to know how to detect and prevent vulnerabilities. This