Skip to content

ActivePwns

Learn ethical hacking

  • POSTS
  • Pentesting Methodology
    • Active Directory
    • Windows PrivEsc
    • Linux PrivEsc
  • whoami

Category: Uncategorized

Active Directory Certificate Services Exploitation

August 11, 2023August 11, 2023 by abhinavdsubedi@gmail.com

Explanation Credit: Will Schroeder and Lee Christensen were the ones who originally figured out a lot of the ADCS vulnerabilities.

Continue reading…Active Directory Certificate Services Exploitation

Silver Ticket in Active Directory

July 29, 2023August 11, 2023 by abhinavdsubedi@gmail.com

To make it simple: Silver tickets are forged Service tickets. Service tickets are tickets that allow users to access services.

Continue reading…Silver Ticket in Active Directory

Golden Ticket in Active Directory

July 20, 2023July 21, 2023 by abhinavdsubedi@gmail.com

Explanation When a user authenticates to a service in an Active Directory network, Kerberos will give them a ticket which

Continue reading…Golden Ticket in Active Directory

Weak File Permissions – Linux PrivEsc

July 12, 2023July 12, 2023 by abhinavdsubedi@gmail.com

Weak File Permissions In Linux, file permissions are used to control who can access files and directories and what level

Continue reading…Weak File Permissions – Linux PrivEsc

Null Authentication – Active Directory Enumeration

July 4, 2023July 4, 2023 by abhinavdsubedi@gmail.com

Null Authentication Null Authentication: The client connects to a server (SMB, RPC, etc) without providing any credentials. The server will

Continue reading…Null Authentication – Active Directory Enumeration

Bypass UAC: Windows Privilege Escalation

June 23, 2023June 28, 2023 by abhinavdsubedi@gmail.com

What is UAC? User Account Control is a security feature in Windows that protects the machine from unauthorized code. Its

Continue reading…Bypass UAC: Windows Privilege Escalation

Dumping Hashes in Active Directory (Mimikatz)

June 23, 2023June 23, 2023 by abhinavdsubedi@gmail.com

Mimikatz is a tool that is primarily used for retrieving sensitive information from Windows operating systems. Its commonly used for

Continue reading…Dumping Hashes in Active Directory (Mimikatz)

Kerberoasting – Active Directory

May 19, 2023May 19, 2023 by abhinavdsubedi@gmail.com

Kerberoasting is a method used to extract password hashes of Active Directory service accounts, which are often used for running

Continue reading…Kerberoasting – Active Directory

Scheduled Tasks – Windows PrivEsc

May 7, 2023May 30, 2023 by abhinavdsubedi@gmail.com

Scheduled tasks are automated tasks that run on a predefined schedule or in response to a specific event on a

Continue reading…Scheduled Tasks – Windows PrivEsc

Transferring files from Kali to Windows

May 4, 2023May 4, 2023 by abhinavdsubedi@gmail.com

On Kali, start a python webserver Then, download the file on windows

Copyright © 2025 ActivePwns | Bold Photography by Catch Themes
Cleantalk Pixel Scroll Up Scroll Up