Tag
Objective: From an initial foothold, escalate privileges to Domain Admin and demonstrate full domain compromise. 1. Initial Reconnaissance O…
L'écosystème npm, pierre angulaire du développement JavaScript moderne, a récemment fait l'objet d'une attaque sophistiquée d'une ampleur sa…
Les Server-Side Template Injection (SSTI) représentent une classe de vulnérabilités particulièrement dangereuses qui permettent aux attaquan…
Kerberoasting, ASREPRoasting, Golden/Silver Tickets, DCSync et Techniques de Persistance Les environnements Active Directory (AD) représente…
Les techniques de Living-off-the-Land (LotL) représentent aujourd'hui l'une des méthodes d'attaque les plus sophistiquées et insidieuses dan…
Introduction Eureka is a fascinating HackTheBox machine that demonstrates real-world vulnerabilities in Spring Cloud microservices architect…
Overview Era is a Linux machine from Hack The Box that demonstrates several interesting attack vectors including IDOR vulnerabilities, privi…
This is a detailed walkthrough of the "Outbound" machine from Hack The Box, demonstrating the complete exploitation chain from initial recon…
Introduction Cap is an easy-difficulty Linux machine from HackTheBox that demonstrates the importance of proper access controls and keeping …
Overview SimpleCTF is a beginner-friendly CTF challenge on TryHackMe that focuses on basic enumeration, exploitation of a CMS vulnerability,…
Executive Summary SilverPlatter is an easy-difficulty CTF machine from TryHackMe that demonstrates common web application vulnerabilities an…
Introduction In this post, I'll walk you through building a comprehensive Security Operations Center (SOC) automation lab that integrates Wa…