Kerberoasting: An Offensive Playbook

Active Directory, a cornerstone of many networks, is riddled with complexities and nuances. It is these intricacies that give birth to vulnerabilities like Kerberoasting. This article aims to provide a detailed, hands-on guide to Kerberoasting for Capture The Flag (CTF) enthusiasts. Let it serve as a touchstone during your challenges. Kerberos and SPNs Kerberos A […]

Privilege Escalation Techniques

A cheat sheet to assist in efficient privilege escalation techniques across various systems. Linux Always check Scripts linPEAS GTFOBins Window Unquoted Service Paths Scheduled Tasks and Services Weak File/Folder Permissions Stored Credentials Windows Credential Manager SAM NTDS.dit Directories Pagefile.sys and Hiberfil.sys

Back To Top