
Red Teaming
-
Active Directory Protocols Unpacked: A Practical Learning Journey - Day 02
From Kerberos to NTLM and LDAP to DNS, this deep-dive unpacks the core Active Directory protocols attackers love — and defenders must understand. With analogies, examples, and red team insights, this is your protocol playbook. -
Active Directory Demystified: A Practical Learning Journey - Day 01
Active Directory powers most enterprise networks — and attackers love it. This guide simplifies AD with real-world analogies and attacker-focused insights to help you learn, enumerate, and exploit it effectively. -
What I Do After the User Flag — My Beginner’s Priv Esc Flow
Getting user.txt is just the beginning. Here’s how I hunt for privilege escalation paths on Linux boxes — what I check, how I think, and why it still stumps me sometimes.