TATHAGATA ROYthreatradar.vercel.app·Sep 6, 2024HTB Noxious Walkthrough: LLMNR Poisoning & Network ForensicsIntroduction to HTB Noxious In this HTB lab, I dive into a real-world network forensics scenario involving an Active Directory network. The setup focuses on identifying and mitigating an LLMNR (Link-Local Multicast Name Resolution) poisoning attack, ...29 readsSecurity
Lasith Hettiarachchiblog.lasith.dev·Jan 24, 2024How to Replace NTLM With Basic Authentication With a ProxyIn today's interconnected world, where various applications and services interact seamlessly, encountering authentication protocols like NTLM can present unique challenges. This was precisely my dilemma when I encountered an API service requiring NTL...214 readsProxy Server
cateOVRcateovr.hashnode.dev·Sep 10, 2023Active Directory PentestingIntroduction My final year project at the University of Malaga (Spain) is the creation of an Active Directory environment for its exploitation. The objective of this project is to highlight the most common attacks that occur in real business environm...26 readsActive Directory