PinnedPublished inInfoSec Write-upsWindows Active Directory Hacking Lab Part 3 — Joining Machines to the DomainNow to finish everything up by tying together our domain controller with the users and groups that we have created.Apr 16, 2024Apr 16, 2024
PinnedPublished inInfoSec Write-upsWindows Active Directory Hacking Lab Setup — Part 2, Setting up Users Machines and GroupsFair warning: This post, like the last one, is very long because I encountered some issues during initial setup, and sometimes having a…Jan 10, 20242Jan 10, 20242
PinnedPublished inInfoSec Write-upsWindows Active Directory Hacking Lab Setup — Part 1, Domain ControllerThis post will outline setting up a hacking lab for Active Directory Pentesting. Full disclosure, this lab is based off of the TCM…Nov 2, 20232Nov 2, 20232
PinnedOWASP Top 10 Testing Guide V4 ChecklistA handy checklist for security researchers and bug bounty hunters.Jan 14Jan 14
Published inInfoSec Write-upsOSCP Tactics: How to Create a Malicious Word Macro for Remote Code ExecutionDon’t click that “Enable Content” button…Feb 25Feb 25
Published inInfoSec Write-upsActive Directory Exploit Basics: SMBClientSmbclient is the standard issue tried and true enumeration tool for AD and Windows environmentsFeb 20Feb 20
Published inInfoSec Write-upsSQL Injection Tactics: Achieving Code Execution for your OSCP SkillsetLeveraging SQL Injection for OSCP skillsetJan 31Jan 31
Published inInfoSec Write-ups5 Steps to Crafting a Reverse Shell Plugin in WordPress [OSCP RCE Tactics for Beginners]When the system is a fortress, your skillset is the skeleton key. This tutorial arms you with the code and insight to breach — use it…Jan 23Jan 23
Published inInfoSec Write-upsHacking Cicada on HackTheBox: An OSCP Step-by-Step JourneyActive Directory Exploitation at it’s best!Jan 11Jan 11
Published inInfoSec Write-upsHacking CozyHosting on HackTheBox: A Step-By-Step OSCP JourneyThis time I’m tackling CozyHosting: Careful enumeration of technologies leads to Command Injection for a foothold.Jan 9Jan 9