Welcome back to my blog, today we will discuss about what BloodHound is, how it can be used in active directory (AD) enumeration, installation steps, how to collect active directory data with SharpHound, how to analyze attack paths with BloodHound, how to exploit weak kerberos delegation, and how we can secure active directory against BloodHound attacks.
Continue reading »Welcome to another Hack the Box walkthrough. In this blog post, I have demonstrated how I owned the Facts machine on Hack the Box. Hack The Box is a cybersecurity platform that helps you bridge knowledge gaps and prepares you for cyber security jobs.
Continue reading »Welcome to another Hack the Box walkthrough. In this blog post, I have demonstrated how I owned the Guardian machine on Hack the Box. Hack The Box is a cybersecurity platform that helps you bridge knowledge gaps and prepares you for cyber security jobs.
Continue reading »Welcome to another Hack the Box walkthrough. In this blog post, I have demonstrated how I owned the Giveback machine on Hack the Box. Hack The Box is a cybersecurity platform that helps you bridge knowledge gaps and prepares you for cyber security jobs.
Continue reading »I am proud to share that I have successfully completed my Master’s degree in Applied Cybersecurity and defended my Master’s thesis
Continue reading »Welcome to another Hack the Box walkthrough. In this blog post, I have demonstrated how I owned CodePartTwo machine on Hack the Box. Hack The Box is a cybersecurity platform that helps you bridge knowledge gaps and prepares you for cyber security jobs.
Continue reading »Welcome to another Hack the Box walkthrough. In this blog post, I have demonstrated how I owned the MonitorsFour machine on Hack the Box. Hack The Box is a cybersecurity platform that helps you bridge knowledge gaps and prepares you for cyber security jobs.
Continue reading »
Social Plugin