Rushikesh PatilforBreachForcebreachforce.net·17 hours agoRed Teaming: The Art of Active Directory EnumerationIntroduction : In the ever-evolving landscape of cybersecurity, red teaming has emerged as a pivotal practice for organizations seeking to fortify their defences against potential threats. Among the arsenal of techniques employed during red team asse...Discuss·32 readsAssumed Breach Odyssey: Red Team Unleashedredteaming
Kamran ArifforAzure Notesazure-notes.hashnode.dev·Dec 8, 2023Day 03: AD Device ManagementDevice Management: Management of physical device like phone, laptop, tablets which is used to access the company's resources. There are 3 ways to get device into Azure AD Azure AD registered Windows Hello: it gives alt way to login to window 10...DiscussActive Directory
Pradip Deyp3ntesterinstanc3.hashnode.dev·Dec 4, 2023Manager HTB Writeup / WalkthroughThe “Manager” machine is created by Geiseric. This is a medium HTB machine with a strong focus on Active Directory Exploitation. So, let’s start……….. Enumeration Add ip to /etc/hosts file as : 10.10.11.236 manager.htb Using Nmap nmap -sC -sV -O ...Discuss·1 likecertipy
Rushikesh PatilforBreachForcebreachforce.net·Dec 2, 2023Assumed Breach: The Red Teamer's Toolkit, Client Pre-Requisites & Initial AccessIntroduction: Hello, fellow cybersecurity enthusiasts! Today, we're delving into the world of Red Team Engagements – a simulated cybersecurity challenge where ethical hacking takes center stage. Our journey begins with a look at the essential startin...Discuss·46 readsAssumed Breach Odyssey: Red Team Unleashedpentesting
AJ Lindnerblog.ajlindner.info·Nov 30, 2023Post-War Analysis: How a Forest Trust Broke Federated AuthenticationThis is the journey of troubleshooting a complex, niche problem that surprisingly resulted in a very simple solution. I ignored many common sense principles, instead diving deep into StackOverflow rabbit holes in desperate search of the complicated t...Discuss·33 readssoftware development
Sumit Mondalsumit007.hashnode.dev·Nov 15, 2023"Unlocking the Digital Kingdom: Navigating the Azure Active Directory Realm"In the vast and ever-evolving landscape of the digital world, where data flows like rivers and connectivity intertwines like a sprawling web, establishing order is no easy feat. Imagine a kingdom, a digital kingdom, where users, devices, and applicat...DiscussAzure
Cyber Seklercybersekler.com·Oct 27, 2023How I Hacked a Domain Controller in 3 Easy StepsSometimes getting the keys to the kingdom is too easy and can have devastating consequences if it gets into the hands of the wrong people. That's why ethical hackers exist to make sure the keys to your kingdom are secure or as secure as possible. In ...Discuss·39 readspentesting
Dylan Hunthashofdarkness.hashnode.dev·Oct 21, 2023Kerberoasting: Using Impacket at the Gates of HadesKerberoasting is a technique used in post-exploitation attacks to extract the password hash of an Active Directory account that has a Service Principal Name (SPN). Since Kerberoasting leverages built-in AD functionality, it can be very difficult to d...Discuss#cybersecurity
Yogeshwaran RforYogi's blogitops.hashnode.dev·Oct 8, 2023Find unknown SID in GPOImport-Module GroupPolicy $gpo = Get-GPO -All Foreach ($g in $gpo) { $permissions = $g.getsecurityinfo() Foreach ($p in $permissions) { If ($p.Trustee.SidType -eq “unknown”) { Write-Host “Policy with unknown SID: $($g.DisplayName)” Write-Host “Truste...DiscussPowershell scripting
Chinemerem Nwosuthecybergeneral.hashnode.dev·Oct 6, 2023How to Set Up an Active Directory LabIntroduction As companies continue to expand, the challenge of maintaining up-to-date contact information for all employees becomes increasingly apparent. Traditional methods, like using a physical phonebook, can quickly become cumbersome and outdate...Discuss·75 readsActive Directory