How to Set Up and Exploit an Active Directory Lab
A practical guide to setting up and attacking an Active Directory lab using Responder, ntlmrelayx, mitm6, and more. Ideal for cybersecurity students and e...
A practical guide to setting up and attacking an Active Directory lab using Responder, ntlmrelayx, mitm6, and more. Ideal for cybersecurity students and e...
Quick and hands-on walkthrough of an SSTI (Server-Side Template Injection) vulnerability using a PicoCTF challenge. No boring theory dumps — just straight...
Using an AWS EC2 server as a proxy can be a powerful tool for various tasks such as accessing restricted content, enhancing security, or managing multipl...
This exam was a fantastic learning experience, so I’m quite pleased with myself for taking it.
This blog demonstrates how a weak authentication response and a lack of complexity in passwords can result in Authentication Bypass. Disclaimer This blo...
This is the GoogleCTF: Beginners’ Quest writeup/walkthrough. “Vienna-Chemical Plant” is the name of the first task.
We’ll talk about how to make your local network services public today (internet). There are several methods for doing so, including port forwarding, router c...