Living Off The Land Living Off The Land (LOTL) techniques leverage native tools, present in the target or victim’s environment,…
SSH Key Exploitation and SMB Recon: A CTF
CTFs (Capture The Flag competitions) offer hands-on experience, simulating real-world cyber scenarios. They hone skills, encourage problem-solving, foster teamwork, and…
Windows Security: Abusing Access Tokens | Practical
Windows, in its core security design, leverages access tokens to determine if accounts possess the requisite permissions to execute certain…
SQLi and Reverse SSH Tunnelling | Game Zone THM
Game Zone, offered by TryHackMe, is a box that covers a broad spectrum of tasks. It takes participants through SQL…
Threat Modeling: STIDE and DFD
In the dynamic landscape of cybersecurity, establishing a clear understanding of threats is paramount. While introductory courses may gloss over…
Working with Linux Capabilities | Cap HackTheBox
Linux capabilities allow for a nuanced approach to the security architecture, breaking down the absolute root privilege into specific individual…
Scanning for the CTF Arena
This is a reference guide offering concise command suggestions for machine scanning. It encompasses widely-used tools and provides “living off…
Golden Ticket Attacks
Active Directory (AD) is ubiquitous in enterprise networks, acting as the keystone for authentication and access. As with any system,…
Shells for Hackers
This cheat sheet is an essential guide, designed to aid in swiftly deploying shells across various computing environments. Use it…