Cyber Security Blog
  • Home

hacking

A collection of 3 posts
Hack the Box Walkthroughs: Hathor
hackthebox Featured

Hack the Box Walkthroughs: Hathor

Hathor from Hack the Box was an Insane Windows machine that involves exploiting a misconfigured file upload, then identifying credentials in log files, before performing some DLL hijacking and finally, abusing an account with replication rights to obtain the administrator's password hash.
Nov 19, 2022 15 min read
Hack the Box Walkthroughs: Anubis - Using SliverC2
active directory

Hack the Box Walkthroughs: Anubis - Using SliverC2

In an attempt to broaden my skill set, I'll be using the SliverC2 to complete Hack the Box machines and learn more about this fantastic Command and Control framework. This time around it's the retired box: Anubis!
May 6, 2022 19 min read
Active Directory Penetration Testing - The Fundamentals of Kerberos
cybersecurity Featured

Active Directory Penetration Testing - The Fundamentals of Kerberos

A blog post for me to try and finally fully understand the internals of how Kerberos and Active Directory authentication works within a domain (and how it's broken).
May 4, 2022 25 min read
Page 1 of 1
Cyber Security Blog © 2023
Powered by Ghost