n00🔑Solving Game of Active Directory (GOAD) by Orange Cyberdefense Part-2LLMNR and NBT-NS PoisoningOct 22, 2023Oct 22, 2023
n00🔑Solving Game of Active Directory (GOAD) by Orange Cyberdefense Part-1smb signing is disabled and version 1 is enabled for some hosts.Oct 11, 2023Oct 11, 2023
n00🔑Persistence ways(The adversary is trying to maintain their foothold)Gaining continued access to a computer system or network that has been compromised is known as persistence. It requires bypassing security…Jan 8, 2023Jan 8, 2023
n00🔑Creating Malicious Word DocumentsHi readers, here we will be looking into creating malicious word documents with the intent of running system commands using macro…Nov 30, 2022Nov 30, 2022
n00🔑Creating and configuring a Honeypot account in Active DirectoryHi readers, here we will be looking into the detection of password spraying attempts by adversaries. Specifically, we will be creating an…Sep 10, 20221Sep 10, 20221
n00🔑Windows privilege escalation via Misconfigured Services, Registry, SAM/SYSTEM files, User…Hi readers this is just another windows privesc article. Here we will be seeing how misconfigured services, registry and exposed SAM/SYSTEM…Jul 4, 2021Jul 4, 2021
n00🔑Enumerate AD remotely with any valid user account credentials.Prerequisite: Credentials for atleast one account which you compromised.(support:#00^BlackKnight) in this demo example.Dec 27, 2020Dec 27, 2020
n00🔑Active Directory Attack paths(with exploitation)(will be updated as I learn more):Abusing WriteOwner rights:Jan 7, 2021Jan 7, 2021
n00🔑How to make your windows 10 dizzy without weed:Windows security researcher Jonas Lykkegaard recently on 17th Jan posted a file path upon accessing crashes the windows 10 latest(for now…Jan 18, 2021Jan 18, 2021
n00🔑R 3.4.4 — Buffer Overflow (Vanilla EIP Overwrite)Hi readers, this is just another windows buffer overflow walkthrough. We will be going through step by step process starting from fuzzing…Jul 3, 2020Jul 3, 2020
n00🔑Fully Disable Hyper-V to turn back to vmware/virtualbox.I am a regular Vmware/Virtual box user. These are type 2 hypervisors. But I decided to try out Hyper-V technology shipped with Windows 10…Jun 23, 2020Jun 23, 2020
n00🔑Linux Privilege Escalation via yum package manager.Hi, readers in this article we will be seeing how can we use “yum” package manager for privilege escalation. This is used in RPM-based…Sep 22, 2020Sep 22, 2020
n00🔑TartarSauce HTB privescIf we can control a tar archive file which is getting extracted by root, we can escalate our privileges. Let’s see this in action ….Aug 1, 2021Aug 1, 2021
n00🔑Linux Buffer overflow Data Execution Prevention(DEP) bypass with ASLR disabledNote: this scenerio is in frolic htb machine.Oct 20, 2021Oct 20, 2021