top of page
​
Search
Winifred
5 hours ago8 min read
Running Laps on LAPS feat. HTB Timelapse
Winning the race on DACL abuse and LAPS through a HTB Timelapse walkthrough
2 views0 comments
z3r0day_504
Mar 4, 20245 min read
Data Democracy: Is Your Voter Registration Data Safe?
During the peak of primary election season, most active voters are more concerned with the candidates and their stances on key divisive...
18 views0 comments
z3r0day_504
Sep 25, 20233 min read
Email Spoofing When DMARC != Properly Configured
Email spoofing testing and how-to for when DMARC policies are improperly configured
48 views0 comments
z3r0day_504
Sep 4, 20231 min read
Exploiting MS08-067 without Metasploit (HTB Legacy Walkthrough)
Enumeration First we run a generic nmap scan against the box to see what ports and services are available: We see that SMB is open, let's...
158 views0 comments
z3r0day_504
Aug 28, 20233 min read
Exploiting MS17-010 without Metasploit (HTB Blue Walkthrough)
Enumeration First we run an nmap scan against the target: Here we can see that port 445 (SMB) is open. We also see the computer name as...
161 views0 comments
z3r0day_504
Aug 22, 20233 min read
Exploiting CVE-2023-32784 (KeePass)
Overview Vulnerability in a Nutshell PoC Demo/Walkthrough Troubleshooting and Reliability Alternate Attack Paths for KeePass Overview...
104 views0 comments
z3r0day_504
Feb 7, 20233 min read
HTB Walkthrough: Photobomb
Enumeration Upon enumerating with nmap we discover that ports 22 and 80 are open. When we navigate to the IP address via the browser, we...
27 views0 comments
z3r0day_504
Jan 16, 20233 min read
HTB Walkthrough: Precious
Enumeration To start working on this box, we'll first run an nmap scan against it to see what ports are open and what services are...
1,049 views0 comments
z3r0day_504
Dec 19, 20223 min read
Mimikatz 101
If you're new to the infosec/offsec space, the name "Mimikatz" may be foreign or quite vaguely familiar; however, for the folks that have...
273 views0 comments
z3r0day_504
Nov 9, 20224 min read
Hacker101 CTF: Micro-CMS v1 Walkthrough
Walkthrough for Micro-CMS v1 challenge on the HackerOne Hacker101 CTF
204 views0 comments
z3r0day_504
Oct 3, 20222 min read
Meeting the 3 Headed Dog: Kerberos Authentication Basics
If you've been in the information security or network administration community for some period of time, chances are you've heard of...
115 views0 comments
z3r0day_504
Sep 12, 20222 min read
Pass the Hash vs Overpass the Hash
A common technique to leverage once a user's credentials have been harvested is passing the hash; how does that differ from "overpassing...
1,947 views0 comments
z3r0day_504
Aug 22, 20223 min read
What is an AMSI bypass?
You may have heard about an AMSI bypass in the context of a work conversation, but what exactly is it and how does it work? Read on to...
268 views0 comments
z3r0day_504
Aug 1, 20225 min read
CRTP Course and Exam Review
Are you considering taking Pentester Academy's Attacking and Defending Active Directory course? Read on and find out more about it and...
2,378 views0 comments
z3r0day_504
Jul 25, 20222 min read
Precious Metals: Golden and Silver Ticket Attacks
If you're in the realm of cybersecurity, you're probably already aware of the fact that most if not all processes and architectures are...
198 views0 comments
Home: Subscribe
CONTACT
bottom of page