 
  
    
    
    
Pentesting
- 
    [+] Final Part: Active Directory Journay Day Five: Building, Securing, and Managing a DomainPosted on 10 mins Day Five covers key AD admin tasks - user and group creation, GPO management, and domain joins—using PowerShell with a security-focused approach.![[+] Final Part: Active Directory Journay Day Five: Building, Securing, and Managing a Domain](/penetration-testing/active-directory-journay-day-five/ad_challenge_day_5_thumbnail_hu_a483c25cc0c01693.png)  
- 
    Active Directory Journey Day Four: Rights, Privileges, GPOs and a Whole Lot MorePosted on 20 mins This post digs into Group Policy, Active Directory privileges, and built-in groups. I break down who has silent power, how attackers exploit User Rights, and what defenders can do to lock it down. Expect practical cheatsheets, tools, and battle-tested hardening tips.  
- 
    Intro to File InclusionPosted on 8 mins An in-depth and hands-on walkthrough on spotting and exploiting Local File Inclusion (LFI) — from classic payloads to modern bypasses, straight from HTB Academy labs.  
- 
    Breaking Htb UnderpassPosted on 11 mins Cracked the UnderPass HTB box by skipping dead ends, abusing SNMP leaks, and turning mosh-server into a root shell with zero password — here is how.