This is the starting of the series "Active Directory Exploitation" where I'll be sharing how I am upskilling myself on AD Exploitation by exploring tools and solving various labs and networks
--AD--Exploitation
[RECORD: 0x003]19-06-2022
Paper Walkthrough | HackTheBox
[VISUAL]
Vulnerable Wordpress website, providing access to internal chat system and un-patched CVE-2021-3560.
--Wordpress--RCE--Chat System--CVE
[RECORD: 0x004]24-05-2022
The Auror Project | Challenge-2: Crown Jewel Analysis | Phase-1
[VISUAL]
In this challenge, we'll be setting up users and groups in our lab to perform analysis whenever an activity is performed.
--Analysis--AD--Sysadmin
[RECORD: 0x005]19-05-2022
The Auror Project | Challenge-1: Automate AD Lab Setup
[VISUAL]
In this challenge, we'll be automating the process of setting up an AD Lab using Vagrant
--Devops--Automation--AD
[RECORD: 0x006]19-05-2022
Backdoor Walkthrough | HackTheBox
[VISUAL]
A Linux Web Server running vulnerable GDB Server and un-patched CVE-2021-3560.
--Wordpress--RCE--Directory Traversal
[RECORD: 0x007]03-03-2022
TIWAP Official Walkthrough | Hard Difficulty | Part - 3
[VISUAL]
This is the official walkthrough of Totally Insecure Web Application Project (TIWAP) with hard level of difficulty.
--Web--Multiple Vulnerabilities
[RECORD: 0x008]03-03-2022
TIWAP Official Walkthrough | Hard Difficulty | Part - 2
[VISUAL]
This is the official walkthrough of Totally Insecure Web Application Project (TIWAP) with hard level of difficulty.
--Web--Multiple Vulnerabilities
[RECORD: 0x009]03-03-2022
TIWAP Official Walkthrough | Hard Difficulty | Part - 1
[VISUAL]
This is the official walkthrough of Totally Insecure Web Application Project (TIWAP) with hard level of difficulty.