.NET (1) Active Directory (9) Adsim (1) Adversary Simulation (4) Archive (6) Certifications (1) HacktheBox (2) Linux (1) MalDev (2) Offsec (1) Pentesting (8) Vulnlab (2) Windows (11)

 .NET (1)

Using Offensive .NET to Enumerate and Exploit Active Directory Environments

 Active Directory (9)

Operating Outside the Box - NTLM Relaying Low-Privilege HTTP Auth to LDAP
Make Sure to Use SOAP(y) – An Operators Guide to Stealthy AD Collection Using ADWS
Attacking and Defending Configuration Manager - An Attackers Easy Win
Stealthy Enumeration of Active Directory Environments Through ADWS
Using Offensive .NET to Enumerate and Exploit Active Directory Environments
NTLM Relaying to LDAP - The Hail Mary of Network Compromise
Intercept
Reflection
Active Directory Certificate Services (AD CS) - A Beautifully Vulnerable and Mis-configurable Mess

 Adsim (1)

Evading AV/EDR with Cobalt strike

 Adversary Simulation (4)

Operating Outside the Box - NTLM Relaying Low-Privilege HTTP Auth to LDAP
Make Sure to Use SOAP(y) – An Operators Guide to Stealthy AD Collection Using ADWS
Attacking and Defending Configuration Manager - An Attackers Easy Win
Stealthy Enumeration of Active Directory Environments Through ADWS

 Archive (6)

Intercept
Reflection
Active
Diving into HeadHunter
Forest
My Experience with OSCP and the "Try Harder" Mindset

 Certifications (1)

My Experience with OSCP and the "Try Harder" Mindset

 HacktheBox (2)

Active
Forest

 Linux (1)

Diving into HeadHunter

 MalDev (2)

Evading AV/EDR with Cobalt strike
Diving into HeadHunter

 Offsec (1)

My Experience with OSCP and the "Try Harder" Mindset

 Pentesting (8)

NTLM Relaying to LDAP - The Hail Mary of Network Compromise
Intercept
Reflection
Active Directory Certificate Services (AD CS) - A Beautifully Vulnerable and Mis-configurable Mess
Active
Diving into HeadHunter
Forest
My Experience with OSCP and the "Try Harder" Mindset

 Vulnlab (2)

Intercept
Reflection

 Windows (11)

Operating Outside the Box - NTLM Relaying Low-Privilege HTTP Auth to LDAP
Make Sure to Use SOAP(y) – An Operators Guide to Stealthy AD Collection Using ADWS
Attacking and Defending Configuration Manager - An Attackers Easy Win
Stealthy Enumeration of Active Directory Environments Through ADWS
Using Offensive .NET to Enumerate and Exploit Active Directory Environments
NTLM Relaying to LDAP - The Hail Mary of Network Compromise
Active Directory Certificate Services (AD CS) - A Beautifully Vulnerable and Mis-configurable Mess
Evading AV/EDR with Cobalt strike
Active
Diving into HeadHunter
Forest