Uncategorized

Kerberos Deep Dive

Last week, I was solving the TryHackMe room on kerberos attacks and techniques. I was unable to understand the underlying concepts. I was not getting the actual technique and mechanism of how those tools like rubeus, impacket are working and how they are enumerating users, how mimikatz in performing golden ticket attacks. Then I understood, […]

Kerberos Deep Dive Read More »

Cr3dov3r

    While doing some digging for potentially useful tools, I came across this tool called Cr3dOv3r. Cr3dOv3r is a tool to check for password reuse on 15 different sites. When white hat hackers conduct a pentest, it is typical that they find password reuses which allows them to SSH into other systems of the target/client.

Cr3dov3r Read More »

Hacking Fundamentals

There are 6 basic steps in hacking process. A young Enthusiast has to understand that hacking follows a very strategic process and when broken down can give your tasks and agenda clarity.  First Step: Reconnaissance Recon is the most important step of all the processes and it is broken down into two sub- task : Active

Hacking Fundamentals Read More »

Scroll to Top
Scroll to Top