Welcome to my cybersecurity blog where I share Hack the Box walkthroughs, ethical hacking tutorials, Linux installation tools, and cybersecurity learning guides.
Continue reading »Welcome back to my blog, today we will discuss about what BloodHound is, how it can be used in active directory (AD) enumeration, installation steps, how to collect active directory data with SharpHound, how to analyze attack paths with BloodHound, how to exploit weak kerberos delegation, and how we can secure active directory against BloodHound attacks.
Continue reading »
Hack The Box
Follow me on social media