Published inInfoSec Write-upsFull Lab Notes of Pass-the-Hash for Active Directory PentestingAs a basic Active Directory (AD) pentester, I know you may find it challenging to differentiate between Pass-the-Hash (PtH) and…Aug 22, 2024Aug 22, 2024
Published inInfoSec Write-upsCreating a Vulnerable Active Directory Lab for Active Directory Penetration TestingVulnerable Active Directory (AD) refers to an Active Directory environment that is intentionally configured or set up with weaknesses…Aug 20, 2024Aug 20, 2024
Published inOSINT TeamLocal Privilege Escalation Exercise for Active Directory Penetration TestingIntroductionAug 15, 2024Aug 15, 2024
Published inInfoSec Write-upsDomain Enumeration with PowerShell| Active Directory Penetration TestingIntroductionJul 26, 2024Jul 26, 2024
API Pentesting Series — Type of APIIt is a set of rules and protocols for building and interacting with software applications. APIs allow different software systems to…Jul 6, 2024Jul 6, 2024
Published inOSINT TeamMobile Capture the Flag (CTF) with Beetlebug Vulnerable APKCapture the Flag (CTF) competitions are an excellent way for cybersecurity enthusiasts to hone their skills in a practical, hands-on…Jul 5, 2024Jul 5, 2024
Vulnerability Scanning for Android Application with Vooki (Yaazhini)IntroductionJun 30, 2024Jun 30, 2024
Published inOSINT TeamLearn Android Penetration Testing Skill with This Vulnerable APKIn the realm of cybersecurity, pentesting (penetration testing) is a critical skill that helps identify and mitigate vulnerabilities in…Jun 26, 2024Jun 26, 2024
Published inOSINT TeamSensitive Information, Endpoint, Hardcode Finding in Android PentestingIn the context of Android pentesting (penetration testing), hardcoding refers to embedding sensitive information or configuration data…Jun 23, 2024Jun 23, 2024