Azure Attack Paths Management
Every object in azure (users, service principals, device, apps) combines to form attack paths that adversaries can find and exploit and take over your whole ...
Every object in azure (users, service principals, device, apps) combines to form attack paths that adversaries can find and exploit and take over your whole ...
The rise of cloud computing has seen many companies shifting their attention to adopting cloud services such as storage, network, database, and software appl...
Single sign-on (SSO) is a technology which combines several different application login screens into one regardless of the domain, platform, or technology th...
PowerShell is a command-based shell and scripting language used for task automation and as a configuration framework tool. PowerShell runs on Windows, Linux,...
Hashcat is a popular and effective password cracker widely used by both penetration testers and sysadmins as well as criminals and spies. It can utilize your...
Computers uses several number system to represent and work with numbers.The most popular ones are binary, octal, decimal and hexadecimal.
What is Active Directory
The structure
The following are some useful concepts I was able to grasp from tackling the above HTB box.
Takeaway points:
I was able to complete a challenge posted on Try Hackme Website and below are a few takeaways from it.
Instead of doing a writeup I have opted to write a summary of the things that I learnt from solving the Shocker of Hack The Box.
The following are a few takeaway points from the Beep box.
It’s pseudo device file ,opening tcp connection to socket.
An electronic verification of the sender.
A utility crafted by a developer named Mark Russinovich and his company SysInternals
The science of secret writing with the intention of keeping the data secret.