VOIDREAD
VOIDREAD
Home Posts Writeups
Posts
Field notes, tools, and traces left behind.
AD . 17

Valid User (No Password)

Valid User (No Password) techniques and commands for Active Directory security assessment.

AD . 16

Trusts

Trusts techniques and commands for Active Directory security assessment.

AD . 15

SCCM

SCCM techniques and commands for Active Directory security assessment.

AD . 14

Persistence

Persistence techniques and commands for Active Directory security assessment.

AD . 13

No Credentials

No Credentials techniques and commands for Active Directory security assessment.

AD . 12

Man In The Middle (Listen and Relay)

Man In The Middle (Listen and Relay) techniques and commands for Active Directory security assessment.

AD . 11

Quick Compromise

Quick Compromise techniques and commands for Active Directory security assessment.

AD . 10

Low access (Privilege escalation)

Low access (Privilege escalation) techniques and commands for Active Directory security assessment.

AD . 09

Lateral Movement

Lateral Movement techniques and commands for Active Directory security assessment.

AD . 08

Know vulnerabilities authenticated

Know vulnerabilities authenticated techniques and commands for Active Directory security assessment.

AD . 07

Domain Admin

Domain Admin techniques and commands for Active Directory security assessment.

AD . 06

Kerberos Delegation

Kerberos Delegation techniques and commands for Active Directory security assessment.

AD . 05

Crack Hash

Crack Hash techniques and commands for Active Directory security assessment.

AD . 04

Valid Credentials (cleartext creds, nt hash, kerberos ticket)

Valid Credentials (cleartext creds, nt hash, kerberos ticket) techniques and commands for Active Directory security assessment.

AD . 03

Admin Access

Admin Access techniques and commands for Active Directory security assessment.

AD . 02

ADCS

ADCS techniques and commands for Active Directory security assessment.

AD . 01

ACLs/ACEs permissions

ACLs/ACEs permissions techniques and commands for Active Directory security assessment.

WIN . 02

Building Windows Executables with GitHub Actions

A comprehensive explanation of how GitHub Actions compiles native Windows executables using hosted Windows runners and official build toolchains

LNX . 01

Enable AVX/AVX2 Support in Kali VM on VirtualBox

Enable AVX/AVX2 Support in Kali VM on VirtualBox

LNX . 04

timewrap: A Handy faketime Alias Using NTP

A shell function to run commands with time spoofing using faketime and NTP servers

WIN . 01

Active Directory Certificate Services (AD CS) Exploitation – ESC Paths Cheatsheet

A concise, attacker-focused reference of Enterprise Security Control (ESC) abuse paths in Active Directory Certificate Services.

LNX . 05

Web Shell via Polyglot ZIP + PDF Upload Bypass

Bypassing file upload filters using ZIP/PDF polyglots or directory tricks.

WIN . 04

SeManageVolumePrivilege Exploit

SeManageVolumePrivilege Exploit – AD CS Certificate Theft to DA via Certipy

WIN . 03

Certipy Shadow Credentials (KeyCredentialLink Abuse)

Covert lateral movement by injecting shadow credentials into a target user's object.