Uncategorized

header
Uncategorized

Walking Along the PATHS of the Administrator

In this blog, we’ll discuss how service paths can be abused to escalate privileges in Windows systems. As usual, we’ll l...

duck
Uncategorized

Pwn3d In Seconds – Attack of the Rubber Duck

In this blog, we’ll be looking at the USB Rubber Ducky or the BadUSB. We’ll start by an introduction to BadUSBs, what ma...

Active Directory
Uncategorized

Active Directory Domain Enumeration & Exploitation using BloodHound

In this blog, we will have an in-depth look at BloodHound. We will start by discussing what BloodHound is, how to instal...

BoF
Uncategorized

Exploiting a Simple Stack – Based Buffer Overflow Vulnerability

In this blog, we will be discussing the basics of exploit development by exploiting a stack overflow vulnerability in a ...

Active Directory
Uncategorized

Let the Secrets “Sync” In – The DCSync Attack

In this blog, we will be focusing on abusing the Replication of Directory Services feature of an Active Directory enviro...

Active Directory
Uncategorized

Kerberoasting – Roasting the Three Headed Dog

This attack targets the Kerberos Authentication Protocol in an Active Directory environment, and attempts to retrieve th...