
Hacking Articles
21,508 FOLLOWERS
A comprehensive source of information on cybersecurity, ethical hacking, penetration testing, and other topics of interest for information security professionals. Authored by Raj Chandel. Chandel's primary interests lie in system exploitation and vulnerability research, but you'll find tools, resources, and tutorials on everything.
Hacking Articles
1M ago
In this post, we explore the exploitation technique known as the Shadow Credentials attack. This attack leverages the mismanagement or exploitation of Active Directory Certificate
The post Shadow Credentials Attack appeared first on Hacking Articles ..read more
Hacking Articles
1M ago
Pre2K (short for “Pre-Windows 2000”) Active Directory misconfigurations often stem from overlooked legacy settings in Windows environments. Common issues include enabling NTLM or SMBv1 for
The post Abusing AD Weak Permission Pre2K Compatibility appeared first on Hacking Articles ..read more
Hacking Articles
1M ago
In this post, we explore the exploitation technique known as the Kerberos pre-authentication brute-force attack. This attack takes advantage of Kerberos authentication responses to determine
The post AD Recon: Kerberos Username Bruteforce appeared first on Hacking Articles ..read more
Hacking Articles
2M ago
In this article, we shall explore different tools & techniques that help us enumerate Active Directory (AD) users’ passwords using which an attacker can expand
The post Credential Dumping: AD User Comment appeared first on Hacking Articles ..read more
Hacking Articles
2M ago
The Diamond Ticket attack represents a sophisticated escalation in Active Directory (AD) exploitation methods, leveraging intricate flaws in Kerberos authentication and authorization mechanisms. This article
The post Diamond Ticket Attack: Abusing kerberos Trust appeared first on Hacking Articles ..read more
Hacking Articles
2M ago
In this post, we will explore the exploitation of Discretionary Access Control Lists (DACL) using the AddSelf permission in Active Directory environments. By exploiting this
The post Abusing AD-DACL: AddSelf appeared first on Hacking Articles ..read more
Hacking Articles
3M ago
Active Directory (AD) penetration testing is an essential part of the security assessment of enterprise networks. The Netexec tool offers a wide range of capabilities
The post Active Directory Pentesting Using Netexec Tool: A Complete Guide appeared first on Hacking Articles ..read more
Hacking Articles
3M ago
In this post, we will explore the exploitation of Discretionary Access Control Lists (DACL) using the WriteOwner permission in Active Directory environments. The WriteOwner permission
The post Abusing AD-DACL: WriteOwner appeared first on Hacking Articles ..read more
Hacking Articles
3M ago
In this post, we will explore the exploitation of Discretionary Access Control Lists (DACL) using the WriteDacl permission in Active Directory environments. Attackers can abuse
The post Abusing AD-DACL: WriteDacl appeared first on Hacking Articles ..read more
Hacking Articles
4M ago
In this post, we will explore the exploitation of Discretionary Access Control Lists (DACL) using the GenericWrite permission in Active Directory environments. This permission can
The post Abusing AD-DACL: GenericWrite appeared first on Hacking Articles ..read more