Reza RashidiforRedTeamReciperedteamrecipe.com·19 hours agosystem32 important filesThe System32 directory is a critical component of the Windows operating system, housing essential system files and libraries that are vital for the system’s operation. In the context of offensive security, this directory is significant because it con...Discuss·1 like·295 readssystem32
Reza RashidiforRedTeamReciperedteamrecipe.com·Feb 9, 2024Important Active Directory Attribute for Red/Blue TeamerActive Directory attributes play a crucial role in managing user accounts and group memberships within Windows environments. Attributes such as SAMACCOUNTNAME and USERPRINCIPALNAME are often targeted for username enumeration and phishing attacks. The...Discuss·1.0K readsredteaming
Francis Baziele Saahbaziele.hashnode.dev·Jan 16, 2024Mastering Linux Privilege Escalation: A Hacker's GuideI recently came across an interesting post on Reddit. It was about a guy who was able to hack his colleague's Twitter account. Want to know how he did it? Well, they were actually working on a project together. One day, while messing around with the ...DiscussPrivilege Escalation
BHAVESH PATILparanerdzops.hashnode.dev·Dec 27, 2023How To Setup New User on CentOS 7This guide will walk you through the process of setting up new User on a CentOS 7 with Sudo privileges. Prerequisites Before diving into the process of creating a user on CentOS, ensure the following prerequisites are met: Access to a CentOS server ...DiscussWheel Group
Daniel Huriflyestinfosec.hashnode.dev·Dec 20, 2023THM - "Startup" Write UpFor the past couple of months I've been taking the Junior Penetration Tester course from INE in preparation for the eJPTv2 Exam that I'll be taking shortly, I've decided to complete a few boxes to get some practice in, so I can further prepare as muc...Discuss·30 readsdirbuster
gokupwngoku.pw·Nov 4, 2023Pilgrimage - Linux Easy MachineTL;DR: Through directory brute force, I discovered an exposed .git directory, which allowed me to access the web application's source code and a binary file named 'magick.' After conducting static analysis on this binary, I found that it was from the...Discuss·48 readshtb
Christoph Behrchristophbehr.hashnode.dev·Aug 30, 2023TryHackMe Wonderland WriteupStart the machine I started by booting up my parrot OS machine on VirtualBox, connected via OpenVPN to the TryHackMe network. After I checked if I was connected I started the Wonderland machine. After the machine IP was available I checked with a Pin...Discuss·1 like·65 readstryhackme
sunainsunainwho.hashnode.dev·Aug 28, 2022Unquoted Service path - Windows Privilege EscalationHi Readers, In this article, we will thoroughly discuss a Common security misconfiguration inside windows that lets a Standard user bypass its privileges to of NT AUTHORITY/SYSTEM I am writing this article because of both real-world and CTF occurrenc...Discuss#cybersecurity
b1gsh4d0wb1gsh4d0w.hashnode.dev·Aug 13, 2022Linux PrivEsc - TryHackMe Write-upInfo Name: Linux PrivEsc Description: Practice your Linux Privilege Escalation skills on an intentionally misconfigured Debian VM with multiple ways to get root! SSH is available. Difficulty: Medium Room link: https://tryhackme.com/room/linuxprivesc...Discuss·26 readsTryHackMe Write-upstryhackme
sunainsunainwho.hashnode.dev·Jun 27, 2022Privilege Escalation - Enumeration (Part 2)Hi Readers My name is Sunain and this is Windows Privilege Escalation from my viewpoint. During this series, I will discuss many ways to escalate privileges on Windows-based machines. In the last article of this series, we gathered some crucial data ...Discuss·41 readsWindows