In this blog, I explain a pathway which I took to learn and enhance my Active Directory Skills
AD
Enumeration
Exploitation
Lateral Movement
Persistence
Learning Path
Active Directory Exploitation | Getting Started
Posted On: 08-07-2022
This is the starting of the series "Active Directory Exploitation" where I'll be sharing how I am upskilling myself on AD Exploitation by exploring tools and solving various labs and networks
AD
Exploitation
Paper Walkthrough | HackTheBox
Posted On: 19-06-2022
Vulnerable Wordpress website, providing access to internal chat system and un-patched CVE-2021-3560.
Wordpress
RCE
Chat System
CVE
The Auror Project | Challenge-2: Crown Jewel Analysis | Phase-1
Posted On: 24-05-2022
In this challenge, we'll be setting up users and groups in our lab to perform analysis whenever an activity is performed.
Analysis
AD
Sysadmin
The Auror Project | Challenge-1: Automate AD Lab Setup
Posted On: 19-05-2022
In this challenge, we'll be automating the process of setting up an AD Lab using Vagrant
Devops
Automation
AD
Backdoor Walkthrough | HackTheBox
Posted On: 19-05-2022
A Linux Web Server running vulnerable GDB Server and un-patched CVE-2021-3560.
Wordpress
RCE
Directory Traversal
TIWAP Official Walkthrough | Hard Difficulty | Part - 3
Posted On: 03-03-2022
This is the official walkthrough of Totally Insecure Web Application Project (TIWAP) with hard level of difficulty.
Web
Multiple Vulnerabilities
TIWAP Official Walkthrough | Hard Difficulty | Part - 2
Posted On: 03-03-2022
This is the official walkthrough of Totally Insecure Web Application Project (TIWAP) with hard level of difficulty.
Web
Multiple Vulnerabilities
TIWAP Official Walkthrough | Hard Difficulty | Part - 1
Posted On: 03-03-2022
This is the official walkthrough of Totally Insecure Web Application Project (TIWAP) with hard level of difficulty.