RFSforAD Attacksad-attacks.hashnode.dev·Sep 19, 2023PowerShell Execution Policy BypassBypass PowerShell Execution Policy is a rule that determines what kind of PowerShell scripts and commands you are allowed to run on your computer. There are different levels of the PowerShell Execution Policy: Restricted: This is the strictest polic...DiscussBypass DefencesPowershell
Marilia Henriquezmarilia.cloud·Sep 17, 2023Study roundup!This week I have been slowly, but surely working through TryHackMe's SOC Level 1 and Junior Penetration Tester to prepare for CompTIA's CySA+ as well as Pentest+. I know that learning about frameworks is extremely boring, it's a lot of reading, takin...Discuss·1 like·38 readscysa+
Pradip Deyp3ntesterinstanc3.hashnode.dev·Sep 11, 2023Authority (Hack The Box) writeupThe "Authority" machine is created by mrb3n and Sentinal920. This is a medium HTB machine with a strong focus on Active Directory Exploitation. Reconnaissance Reconnaissance in penetration testing is the initial phase where information is gathered ab...Discuss·3 likes·93 readsLinux
Farkhanda Saleemfarkhandasaleem.hashnode.dev·Sep 10, 2023Setup (AD DS) Active Directory Domain Service on Windows Server 19The role of AD DS is to manage and organize network resources, including users, computers, groups, and other objects, within a Windows-based network environment. AD DS provides centralized authentication, authorization, and configuration for network ...DiscussActive Directory
cateOVRcateovr.hashnode.dev·Sep 10, 2023Active Directory PentestingIntroduction My final year project at the University of Malaga (Spain) is the creation of an Active Directory environment for its exploitation. The objective of this project is to highlight the most common attacks that occur in real business environm...DiscussActive Directory
Rushikesh PatilforBreachForcebreachforce.net·Sep 9, 2023Cracking the TGT: A Deep Dive into Kerberoasting AttackIntroduction - In today's world of computers and the internet, keeping important information safe and making sure no one can access your data are really important for companies. One big part of making sure everything is secure is protecting the way y...Discuss·2 likes·62 readspentesting
ALi3nW3rXali3nw3rx.hashnode.dev·Sep 9, 2023AD DS - UnConstrained DelegationHere is a brief explanation of unconstrained delegation in Active Directory: Unconstrained delegation is a feature in Active Directory that allows a service account to impersonate any user on the network. When a service account is configured for unco...DiscussActive Directory
Pavan G Spavansridhar.co.in·Sep 6, 2023ADWiz - Active Directory User creation ToolIn the world of IT administration, efficiency and simplicity are paramount. Imagine having a powerful tool at your disposal, designed to alleviate the complexities of managing Active Directory accounts seamlessly. Say hello to our cutting-edge creati...DiscussPowershell GUI and ScriptingPowershell GUI
Marcus Schommlersysdive.net·Sep 6, 2023Open Active Directory Users and Computers for a specific OUAfter using Active Directory Users and Computers (ADUC) for decades I only recently learned that there is indeed a way to 'directly jump' to a specific Organizational Unit (OU) when starting it. I wanted this for years because I tend to forget where ...DiscussActive Directory
modesto Tejedatechps.hashnode.dev·Sep 5, 2023PowerShell Script to Find User Lockout Events in Active DirectoryUser account lockouts can be a common and frustrating issue for both IT administrators and end-users. Tracking down the source of these lockouts can be challenging, especially in a large Active Directory environment. Fortunately, PowerShell provides ...DiscussPowershell