
Holy Shuck! Weaponizing NTLM Hashes as a Wordlist
Originally published on TrustedSec. Password reuse is common in Active Directory (AD). From an attacker’s perspective, it is a reliable path to lateral movement or privilege escalation. Most I...

Originally published on TrustedSec. Password reuse is common in Active Directory (AD). From an attacker’s perspective, it is a reliable path to lateral movement or privilege escalation. Most I...

Originally published on TrustedSec. Windows Server Update Services (WSUS) is a trusted cornerstone of patch management in many environments, but its reliance on HTTP/HTTPS traffic makes it a p...
Introduction This blog is just me playing with PowerShell and learning how the syntax works. Anything here should be used for EDUCATIONAL PURPOSES ONLY. Enjoy PowerShell Screenshotting Script Comme...
Introooooo I am writing this blog for two purposes :] To give my opinion on the “Which Cert Should I do to get into Pentesting???” question. To summarize thoughts on random certifications I do...
Greetings! I was bored so I decided to see how hard it would be to bypass a simple home antivirus. I searched “free antivirus” on Google and the first thing that popped-up was Avast. I installed th...
This is the first post on my blog. I was inspired by Graham Helton’s Blog and I took strong inspiration (I copied his template) from Eatthebuffet. As I search for a super cool cyber-tech hacking ...