Cyber Security Blog
  • Home

penetration testing

A collection of 4 posts
Hack the Box Walkthroughs: Hathor
hackthebox Featured

Hack the Box Walkthroughs: Hathor

Hathor from Hack the Box was an Insane Windows machine that involves exploiting a misconfigured file upload, then identifying credentials in log files, before performing some DLL hijacking and finally, abusing an account with replication rights to obtain the administrator's password hash.
Nov 19, 2022 — 15 min read
Automating the Creation of TCM Security's PEH Home Active Directory Labs - It's Terra-fying
active directory

Automating the Creation of TCM Security's PEH Home Active Directory Labs - It's Terra-fying

A guide on how to terraform the Active Directory Home Lab from the Practical Ethical Hacking course by TCM Security - and coincidentally - My first attempt at Infrastructure-as-Code and DevOps!
May 11, 2022 — 10 min read
Hack the Box Walkthroughs: Anubis - Using SliverC2
active directory

Hack the Box Walkthroughs: Anubis - Using SliverC2

In an attempt to broaden my skill set, I'll be using the SliverC2 to complete Hack the Box machines and learn more about this fantastic Command and Control framework. This time around it's the retired box: Anubis!
May 6, 2022 — 19 min read
Active Directory Penetration Testing - The Fundamentals of Kerberos
cybersecurity Featured

Active Directory Penetration Testing - The Fundamentals of Kerberos

A blog post for me to try and finally fully understand the internals of how Kerberos and Active Directory authentication works within a domain (and how it's broken).
May 4, 2022 — 25 min read
Cyber Security Blog © 2023
Powered by Ghost