Uncategorized

cover-2
Uncategorized

Exploiting A Simple Stack-Based Buffer Overflow Vulnerability

In this blog, we will be discussing the basics of exploit development by exploiting a stack overflow vulnerability in a ...

Active Directory
Uncategorized

Letting the Secrets “Sync” In – DCSync Attack

In this blog, we’ll be focusing on abusing the Replication of Directory Services feature of an Active Directory environm...

Active Directory
Uncategorized

Kerberoasting – Roasting the Three Headed Guard of Microsoft Active Directory

This attack targets the Kerberos Authentication Protocol in an Active Directory environment, and attempts to retrieve th...

Active Directory
Uncategorized

Abusing the Rights and Privileges of DNS Admins to own the Domain Controller – Windows Red Teaming

This attack demonstrates how an attacker can abuse some Active Directory misconfigurations and rights of the DNS Admins ...

1
Uncategorized

Attacking Windows 10 Using Mimikatz

With the exponential rise in cyber-attacks, and the attackers using defense evading tools and frameworks; it has become ...

1588369823-page-002
Uncategorized

Working of Ransomware

Normally a malware automatically install itself on a computer and runs in background without showing its presence to use...