Jinendar KothariExternal Penetration Testing 101: Targeting Login Portals (Part-2)Greetings Readers !Oct 2Oct 2
Jinendar KothariExternal Penetration Testing 101: Breaking Down the Methodology (Part-1)Greeting Readers !!Feb 4Feb 4
Jinendar KothariExternal Penetration Testing 101 : A Beginner’s IntroductionGreetings, Cyber Enthusiasts!Jan 141Jan 141
Jinendar KothariRising to the Challenge: Navigating the eJPTv2 to eWPTv2 Certification JourneyHello, dear readers!Jan 4Jan 4
Jinendar KothariGame of Tokens: AD post exploitation with Token ImpersonationGreetings fellow Readers. Welcome to “Game of Tokens,” where the rules of engagement shift, and the battle for Active Directory (AD)…Oct 19, 2023Oct 19, 2023
Jinendar KothariDefend or surrender: poisoning network with responderGreeting fellow readers. In today’s blog post, we delve into a critical juncture faced by organizations worldwide: the choice between…Sep 4, 2023Sep 4, 2023
Jinendar KotharieJPTv2 Exam Unwrapped: What to Expect and How to ExcelGreetings fellow Readers !! While my previous blog posts have revolved around learning new techniques to exploit common Active Directory…Aug 21, 2023Aug 21, 2023
Jinendar KothariUnwrapping GPP: Exposing the cPassword Attack Vector using Active (HTB Machine)Welcome to my another blog post. In this blog we will be delving deep into a menacing aspect of network Vulnerabilities- The targeted…Aug 12, 20231Aug 12, 20231
Jinendar KothariFrom DNS to Domination: DNS Takeover Demystified with mitm6In this blog post, we will be exploring the territory of DNS takeover, a strategic maneuver in the world of Network Penetration testing…Aug 5, 20231Aug 5, 20231