Kerberos DelegationHey friends, it is the 3rd article in my Active Directory Theory and Exploitation series. Today, I would like to talk about 3 types of…Aug 29, 2022Aug 29, 2022
KerberosHey friends, it is the second article in my Active Directory Theory and Exploitation series. Today, I would like to talk about Kerberos…Aug 1, 2022Aug 1, 2022
Domain Enumeration MethodologyHey folks, today I start a new series of articles to discuss Active Directory Exploitation. This is the first article, we focus on domain…Jul 28, 2022Jul 28, 2022
How did I design and build a complex AD setHi Folks, today I would like to share how did I design and build a vulnerable AD set. Before moving to this topic, let me introduce the…Jun 26, 20221Jun 26, 20221
Walkthrough of My Vulnerable AD SetHi guys, in previous days I designed and built a difficult and complex vulnerable AD set, I planned to post the guide to reproduce it…Jun 26, 2022Jun 26, 2022
Black Box Test on eCPTXv2 examHi folks, just as I promised, I am sharing my review on eLearnSecurity’s eCPTX exam from an exam taker without purchasing course material…Apr 19, 2022Apr 19, 2022