Active Directory Exploitation: Forest to Domain Admin
Complete walkthrough of exploiting misconfigured Active Directory permissions, from initial access to full domain compromise using BloodHound analysis and targeted Kerberoasting attacks.
CTF Walkthroughs | Vulnerability Analysis | Research Notes
Complete walkthrough of exploiting misconfigured Active Directory permissions, from initial access to full domain compromise using BloodHound analysis and targeted Kerberoasting attacks.
Exploiting stacked SQL queries in a custom web application, extracting data through error-based injection, and achieving remote code execution via INTO OUTFILE technique.
Deep dive into a recently disclosed remote code execution vulnerability, including root cause analysis, exploit development, and mitigation strategies.
Real-world red team engagement walkthrough covering initial access via spear phishing, Cobalt Strike infrastructure, and modern EDR evasion techniques.