Welcome, today I am writing about SSH Penetration Testing fundamentals describing port 22 vulnerabilities. SSH security is one of the topics we all need to […]
Read moreCategory: All
All articles on the Blog are related to cyber security classes and certifications. Learn how the most common tools are used by security professionals.
Infrastructure Penetration Testing: A Comprehensive Guide
Infrastructure Penetration Testing is a critical aspect of any organization’s security strategy. In this article, we will cover everything you need to know about Infrastructure […]
Read moreUnderstanding the Active Directory Pass the Hash Attack
The Active Directory Pass the Hash (PtH) attack is a type of credential theft attack that allows an attacker to bypass authentication measures and gain […]
Read moreCrackMapExec SMB: Hacking Samba service
Mapping/Enumeration Credential Gathering Dumping SAM database Dumping LSA Database Dumping NTDS – DRSUAPI Dumping NTDS – VSS Spidering Hacking Authentication brute force passwords Pass the […]
Read moreActive Directory Password Cracking with HashCat
Learn how to crack Active Directory Passwords using Hashcat Crack LM Hashs LM hash is used by Microsoft LAN manager used on old versions, which […]
Read moreSearch Engines for Pentesters
As a pentester, you may want to use search engines specifically tailored for gathering information related to security and vulnerabilities. While popular search engines like […]
Read moreHackTheBox Meta WriteUp
Today I decide to create the HackTheBox Meta WriteUp, is a medium machine running Linux released on 22 Jan 2022. I’ve started scanning the machine […]
Read moreDetecting Zerologon with CrackMapExec (CVE-2020-1472)
Today I am writing about CVE-2020-1472 (ZeroLogon) and how can be detected with CrackMapExec and then exploit it using a script. If you want to […]
Read moreActive Directory Penetration Testing: Methodology
Today I am writing about Active Directory penetration Testing methodology, this is part of my study for CRTP by Pentester Academy. Active Directory is a […]
Read moreEnumerating Active Directory: Domains
In this tutorial, we will learn steps to start our journey on Active Directory enumeration, first step is to enumerate information about the Domain. Then […]
Read more