Kerberoasting End to End
A full walkthrough of Kerberoasting: enumeration, hash extraction, cracking, the targeted variant for accounts without SPNs, and the no-preauth edge case. Covers NetExec, …
I document writeups, technical findings, and blog entries here.
A full walkthrough of Kerberoasting: enumeration, hash extraction, cracking, the targeted variant for accounts without SPNs, and the no-preauth edge case. Covers NetExec, …
If you work in IT or cybersecurity, you are going to encounter Active Directory. It is the backbone of almost every corporate network. Trying to learn it by reading …
People often buy a VPN, switch to an encrypted messenger, and assume they are secure. They treat security like a shopping list. But tools alone do not protect you. If you use …
Most developers first learn sorting algorithms by staring at nested loops on a whiteboard. That is usually a mistake.
Hi guys, today I will teach you how to exploit Boolean-based Blind SQL Injection. This is a technique I recently used on a penetration test to extract database usernames …