NTLM authentication prelude to AD pentestingBefore starting any Active Directory pentesting let’s get some things clearApr 25, 202115Apr 25, 202115
Windows Token based Privilege EscalationOne of the ways the Windows implements it’s security is to use the Access Tokens so that users cannot access the secured contents of…Jul 27, 202053Jul 27, 202053
Creating a netcat reverse shell without -eSo it all began when one day I was just thinking to spy on my friend’s Ubuntu pc to check what kind stuff he has (obviously NSFW stuff )Jan 25, 2020502Jan 25, 2020502