External Penetration Testing 101: Breaking Down the Methodology (Part-1)Greeting Readers !!Feb 4Feb 4
External Penetration Testing 101 : A Beginner’s IntroductionGreetings, Cyber Enthusiasts!Jan 141Jan 141
Rising to the Challenge: Navigating the eJPTv2 to eWPTv2 Certification JourneyHello, dear readers!Jan 4Jan 4
Game of Tokens: AD post exploitation with Token ImpersonationGreetings fellow Readers. Welcome to “Game of Tokens,” where the rules of engagement shift, and the battle for Active Directory (AD)…Oct 19, 2023Oct 19, 2023
Defend or surrender: poisoning network with responderGreeting fellow readers. In today’s blog post, we delve into a critical juncture faced by organizations worldwide: the choice between…Sep 4, 2023Sep 4, 2023
eJPTv2 Exam Unwrapped: What to Expect and How to ExcelGreetings fellow Readers !! While my previous blog posts have revolved around learning new techniques to exploit common Active Directory…Aug 21, 2023Aug 21, 2023
Unwrapping GPP: Exposing the cPassword Attack Vector using Active (HTB Machine)Welcome to my another blog post. In this blog we will be delving deep into a menacing aspect of network Vulnerabilities- The targeted…Aug 12, 20231Aug 12, 20231
From DNS to Domination: DNS Takeover Demystified with mitm6In this blog post, we will be exploring the territory of DNS takeover, a strategic maneuver in the world of Network Penetration testing…Aug 5, 20231Aug 5, 20231