Forest- Hackthebox lab

icked off the assessment with a thorough Nmap scan to discover open ports and fingerprint the services running on the Forest host. After identifying RPC on 135, I used rpcclient to connect anonymously and enumerate every domain user. I compiled the discovered usernames into a file and ran Impacket’s GetNPUsers.py Read more

Active- Hackthebox lab

I began this engagement by conducting an Nmap scan to identify open ports on the target. The results revealed several ports in use, including ports 88 (Kerberos), 135 (RPC), 389 (LDAP), and 445 (SMB), which strongly suggested the target was a Windows Domain Controller. Focusing on port 445, I started enumerating Read more

Firefox Containers

I came across a cool Firefox extension in the Practical Bug Bounty course by TCM Security. This extension is called Firefox Multi-Account Containers by Mozilla Firefox. This extension will enable you to have separate Firefox browser sessions in one web browser. This can come in handy for penetration testing or Read more

Threat Modeling

nd threats within an application, system, or network. It involves systematically analyzing the architecture, components, and data flows to understand how attackers might exploit weaknesses. Threat Modeling in Penetration Testing 1. Scope Definition: 2. Gather Information: 3. Identify Assets and Data Flows: 4. Decompose the System: 5. Identify Threats: 6. Read more

Kerberosting

Kerberoasting is a popular attack technique used by cybercriminals to exploit the Kerberos protocol in Windows Active Directory environments. This blog post will discuss the inception of kerberosting, its impact on Active Directory environments, and the steps penetration testers take to use this technique in their assessments. We’ll delve into Read more