Welcome to my cybersecurity blog where I share Hack the Box walkthroughs, ethical hacking tutorials, Linux installation tools, and cybersecurity learning guides.
Continue reading »Welcome back to my blog, today we will discuss about what BloodHound is, how it can be used in active directory (AD) enumeration, installation steps, how to collect active directory data with SharpHound, how to analyze attack paths with BloodHound, how to exploit weak kerberos delegation, and how we can secure active directory against BloodHound attacks.
Continue reading »
Hack The Box
Starting March 29, 2026, I will no longer publish free write-ups for active Hack The Box machines. New active machine walkthroughs, including exploitation and privilege escalation, are now available exclusively to members.
Follow me on social media