Akshit PalHow I Hacked a Domain Controller Without Tools: A Red Team Case StudyExploring Subtle Vulnerabilities and Misconfigurations in High-Security EnvironmentsOct 8Oct 8
Akshit PalInsecure deserialization Explained: Exploiting deserialization vulnerabilities in mobile…Key HighlightsMar 28Mar 28
Akshit PalDeep Dive into CVSS (Common Vulnerability Scoring System): Demystifying CVE-2022–41741 in NGINX…In the intricate landscape of cybersecurity, CVSS emerges as a beacon, providing a standardized approach to assessing vulnerabilities. In…Nov 15, 2023Nov 15, 2023
Akshit PalSMB Relay Attack To Gain ShellIn Summary: Simple 5-Step SMB Relay Attack can help you get a shell in Active Directory (AD) EnvironmentJul 21, 2022Jul 21, 2022
Akshit PalCommon VA PT Questions Asked in An InterviewThese questions are generally asked in an interview for an entry penetration testing roleDec 17, 2021Dec 17, 2021
Akshit PalHow GCP IAM works ?I have worked on GCP labs recently, while learning and capturing more knowledge on GCP I came to know about IAM which is one of the…Sep 27, 2021Sep 27, 2021