Shadow SlayerNTLM authentication prelude to AD pentestingBefore starting any Active Directory pentesting let’s get some things clearApr 25, 2021Apr 25, 2021
Shadow SlayerWindows Token based Privilege EscalationOne of the ways the Windows implements it’s security is to use the Access Tokens so that users cannot access the secured contents of…Jul 27, 2020Jul 27, 2020
Shadow SlayerCreating a netcat reverse shell without -eSo it all began when one day I was just thinking to spy on my friend’s Ubuntu pc to check what kind stuff he has (obviously NSFW stuff )Jan 25, 20202Jan 25, 20202