Overview : In this blog, we’ll embark on a journey into the world of LDAP (Lightweight Directory Access Protocol) and Active Directory. But here’s the twist – no pre-existing tools like ldapsearch...
Description : Sau is an easy Hack The Box machine that features two vulnerabilities on its website—SSRF on the main site and OS Command Injection in a locally running website named Maltrail on port...
Description : Sandworm presents a challenging journey, starting with PGP signatures and SSTI exploration to gain SSH access as ‘silentobserver.’ Uncovered a Rust script running as root, leveraged a...
Box Info Derailed is an incredibly challenging Linux machine that focuses on exploiting web vulnerabilities, including Stored Cross-Site Scripting, Session Riding, Arbitrary File Inclusion, an...
Hello everyone, This is EmSec, and I'm excited to share my experience of solving the Sekhmet machine from HackTheBox. As an enthusiast of cybersecurity, I've been exploring various hacking chal...
Mastering Active Directory: A PowerShell Odyssey Introduction to PowerShell and Active Directory PowerShell plays a crucial role in efficiently managing Active Directory, offering powerful cmdlet...
NTLM Authentication in Active Directory Introduction: In Active Directory (AD), apart from Kerberos and LDAP, various other authentication methods are used by applications and services. These inc...
Kerberos Introduction: What is Kerberos protocol : Kerberos is a network authentication protocol designed to provide secure authentication for users and services in a distributed computing envi...
LDAP Introduction to LDAP : LDAP Lightweight Directory Access Protocol is a widely used protocol for accessing and managing directory information. When integrated with Active Directory (AD), LDAP...
DNS : Introduction: DNS (Domain Name System) is a fundamental protocol used on the internet and local networks to translate human-readable domain names into numerical IP addresses. It plays a cruc...
A new version of content is available.