Skip to content

ActivePwns

Learn ethical hacking

  • POSTS
  • Pentesting Methodology
    • Active Directory
    • Windows PrivEsc
    • Linux PrivEsc
  • whoami

Tag: #ethicalhacking

Kerberoasting – Active Directory

May 19, 2023May 19, 2023 by abhinavdsubedi@gmail.com

Kerberoasting is a method used to extract password hashes of Active Directory service accounts, which are often used for running

Continue reading…Kerberoasting – Active Directory

Pass the Hash – Active Directory

May 12, 2023May 12, 2023 by abhinavdsubedi@gmail.com

What is Pass the Hash A pass the hash attack occurs when an attacker obtains the hashed password of a

Continue reading…Pass the Hash – Active Directory

Abusing SeBackupPrivilege to get hashes

May 12, 2023May 12, 2023 by abhinavdsubedi@gmail.com

What is SeBackupPrivilege SeBackupPrivilege is a Windows user privilege that grants a user the ability to bypass file and directory

Continue reading…Abusing SeBackupPrivilege to get hashes

Scheduled Tasks – Windows PrivEsc

May 7, 2023May 30, 2023 by abhinavdsubedi@gmail.com

Scheduled tasks are automated tasks that run on a predefined schedule or in response to a specific event on a

Continue reading…Scheduled Tasks – Windows PrivEsc

Cron Jobs – Linux PrivEsc

April 28, 2023May 8, 2023 by abhinavdsubedi@gmail.com

Created with DALL-E What you’ll learn What are Cronjobs Cronjobs are a way to schedule tasks to be executed automatically

Continue reading…Cron Jobs – Linux PrivEsc

AutoRuns – Windows PrivEsc

April 21, 2023July 21, 2023 by abhinavdsubedi@gmail.com

Autorun applications in Windows are programs or processes that are set to run automatically when the operating system starts up.

Continue reading…AutoRuns – Windows PrivEsc

Insecure Registry Permissions – Windows PrivEsc

April 15, 2023May 15, 2023 by abhinavdsubedi@gmail.com

Windows registry contains important configuration information and settings for the system, applications, and users. If the permissions on certain registry

Continue reading…Insecure Registry Permissions – Windows PrivEsc

A Guide to Tunneling: Access Restricted Networks

April 11, 2023April 25, 2023 by abhinavdsubedi@gmail.com

Note: The explanation for most of the commands are written in the “Extras” section Tunneling is a technique used to

Continue reading…A Guide to Tunneling: Access Restricted Networks

Portable NMAP for Windows

April 10, 2023April 10, 2023 by abhinavdsubedi@gmail.com

Suppose you have gained access to a Windows machine through hacking and discovered that it is connected to an internal

Continue reading…Portable NMAP for Windows

How to build a Hacking lab at Home

April 5, 2023April 25, 2023 by abhinavdsubedi@gmail.com

As we rely more and more on technology, it’s become crucial to know how to detect and prevent vulnerabilities. This

Continue reading…How to build a Hacking lab at Home

Posts navigation

Older posts
Newer posts
Copyright © 2025 ActivePwns | Bold Photography by Catch Themes
Cleantalk Pixel Scroll Up Scroll Up