Sep 18, 2025 · 3 min read · Enumeración Escaneo de puertos ❯ nmap -p- --open --min-rate 5000 -sS -n -Pn 10.10.11.31 -oG allPorts Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-03-31 18:56 -04 Nmap scan report for 10.10.11.31 Host is up (0.16s latency). Not shown: 65513 filt...
Join discussionApr 24, 2025 · 20 min read · I wrote this article because I personally couldn’t find anyone on the internet explaining Kerberos detailed enough separately or while teaching Kerberoasting, most of them just ran tools. And if they did, they didn’t dive deep enough. What can you ex...
Join discussion
Mar 8, 2025 · 21 min read · We began by doing an nmap scan of the machine using the command: result=$(nmap -p- --min-rate=1000 -Pn -T4 10.129.229.114 | grep '^[0-9]' | cut -d '/' -f 1 | tr '\n' ',' | sed 's/,$//' | tr -d '%');nmap -p$result -Pn -sC -sV 10.129.229.114 -oA...
Join discussion
Sep 29, 2024 · 9 min read · ¿Qué es Kerberos? 🐶 Kerberos es un protocolo de autenticación que sirve para autenticar dos dispositivos que se conectan entre sí. No significa que vaya a autorizarlos, sino autenticarlos. Su función es identificar cada usuario mediante cifrado. Es...
Join discussion
May 13, 2023 · 3 min read · Kerberoasting is a technique used by ethical hackers and security experts to evaluate network security. It exploits weak service account configurations to extract service tickets or credentials used by certain system services, enabling a form of priv...
Join discussion