Gustav ShenKerberos DelegationHey friends, it is the 3rd article in my Active Directory Theory and Exploitation series. Today, I would like to talk about 3 types of…9 min read·Aug 29, 2022----
Gustav ShenKerberosHey friends, it is the second article in my Active Directory Theory and Exploitation series. Today, I would like to talk about Kerberos…5 min read·Aug 1, 2022----
Gustav ShenDomain Enumeration MethodologyHey folks, today I start a new series of articles to discuss Active Directory Exploitation. This is the first article, we focus on domain…4 min read·Jul 28, 2022----
Gustav ShenHow did I design and build a complex AD setHi Folks, today I would like to share how did I design and build a vulnerable AD set. Before moving to this topic, let me introduce the…21 min read·Jun 26, 2022--1--1
Gustav ShenWalkthrough of My Vulnerable AD SetHi guys, in previous days I designed and built a difficult and complex vulnerable AD set, I planned to post the guide to reproduce it…11 min read·Jun 26, 2022----
Gustav ShenBlack Box Test on eCPTXv2 examHi folks, just as I promised, I am sharing my review on eLearnSecurity’s eCPTX exam from an exam taker without purchasing course material…5 min read·Apr 19, 2022----