How I Hacked a Domain Controller Without Tools: A Red Team Case StudyExploring Subtle Vulnerabilities and Misconfigurations in High-Security EnvironmentsOct 8, 2024Oct 8, 2024
Insecure deserialization Explained: Exploiting deserialization vulnerabilities in mobile…Key HighlightsMar 28, 2024Mar 28, 2024
Deep Dive into CVSS (Common Vulnerability Scoring System): Demystifying CVE-2022–41741 in NGINX…In the intricate landscape of cybersecurity, CVSS emerges as a beacon, providing a standardized approach to assessing vulnerabilities. In…Nov 15, 2023Nov 15, 2023
SMB Relay Attack To Gain ShellIn Summary: Simple 5-Step SMB Relay Attack can help you get a shell in Active Directory (AD) EnvironmentJul 21, 2022Jul 21, 2022
Common VA PT Questions Asked in An InterviewThese questions are generally asked in an interview for an entry penetration testing roleDec 17, 2021Dec 17, 2021
How GCP IAM works ?I have worked on GCP labs recently, while learning and capturing more knowledge on GCP I came to know about IAM which is one of the…Sep 27, 2021Sep 27, 2021