Setting Up a Windows Server for Penetration Testing with Active Directory 1. Introduction Overview of the blog's purpose : Welcome to the Active Directory Pentesting Blog, your ultimate guide fo...
Port scanning is a scanning method for determining which ports on a network device are open, whether it's a server, a router, or a regular machine. A port scanner is just a script or a program ...
For the ones who didn’t know yet, a Trojan Horse Attack consists of embedding en exploit in an innocent-looking Application, or even in a document. As you might have guessed today we will embed...
Extracting saved passwords in the most popular browser is a useful and handy forensic task, as Chrome saves passwords locally in an SQLite database. However, this can be time-consuming when doi...
A new version of content is available.