
Pentesting
-
[+] Final Part: Active Directory Journay Day Five: Building, Securing, and Managing a Domain
Day Five covers key AD admin tasks - user and group creation, GPO management, and domain joins—using PowerShell with a security-focused approach. -
Active Directory Journey Day Four: Rights, Privileges, GPOs and a Whole Lot More
This post digs into Group Policy, Active Directory privileges, and built-in groups. I break down who has silent power, how attackers exploit User Rights, and what defenders can do to lock it down. Expect practical cheatsheets, tools, and battle-tested hardening tips. -
Intro to File Inclusion
An in-depth and hands-on walkthrough on spotting and exploiting Local File Inclusion (LFI) — from classic payloads to modern bypasses, straight from HTB Academy labs. -
Breaking Htb Underpass
Cracked the UnderPass HTB box by skipping dead ends, abusing SNMP leaks, and turning mosh-server into a root shell with zero password — here is how.