Posts by Tag

pentesting

timewrap: A Handy faketime Alias Using NTP

1 minute read

timewrap: Faketime + NTP Helper for AD Lab Environments. In Active Directory labs, we often need to manipulate system time to: Replay or inspect expired c...

SeManageVolumePrivilege Exploit

1 minute read

Abusing the SeManageVolumePrivilege allows low-privileged users to perform raw volume access — often used for LSASS dumping. However, a more stealthy and dev...

CEH v13 Engage

23 minute read

CEH v13 Engage CEH Engage Part 1 Challenge 1: An attacker conducted footprinting on a web application and saved the resulting report Dumpster.xlsx in the doc...

Back to Top ↑

linux

timewrap: A Handy faketime Alias Using NTP

1 minute read

timewrap: Faketime + NTP Helper for AD Lab Environments. In Active Directory labs, we often need to manipulate system time to: Replay or inspect expired c...

CEH v13 Engage

23 minute read

CEH v13 Engage CEH Engage Part 1 Challenge 1: An attacker conducted footprinting on a web application and saved the resulting report Dumpster.xlsx in the doc...

Back to Top ↑

privilege escalation

CEH v13 Engage

23 minute read

CEH v13 Engage CEH Engage Part 1 Challenge 1: An attacker conducted footprinting on a web application and saved the resulting report Dumpster.xlsx in the doc...

Back to Top ↑

windows

SeManageVolumePrivilege Exploit

1 minute read

Abusing the SeManageVolumePrivilege allows low-privileged users to perform raw volume access — often used for LSASS dumping. However, a more stealthy and dev...

Back to Top ↑

sudo

CEH v13 Engage

23 minute read

CEH v13 Engage CEH Engage Part 1 Challenge 1: An attacker conducted footprinting on a web application and saved the resulting report Dumpster.xlsx in the doc...

Back to Top ↑

linux security

CEH v13 Engage

23 minute read

CEH v13 Engage CEH Engage Part 1 Challenge 1: An attacker conducted footprinting on a web application and saved the resulting report Dumpster.xlsx in the doc...

Back to Top ↑

foothold

Back to Top ↑

active directory

SeManageVolumePrivilege Exploit

1 minute read

Abusing the SeManageVolumePrivilege allows low-privileged users to perform raw volume access — often used for LSASS dumping. However, a more stealthy and dev...

Back to Top ↑

shadow

SeManageVolumePrivilege Exploit

1 minute read

Abusing the SeManageVolumePrivilege allows low-privileged users to perform raw volume access — often used for LSASS dumping. However, a more stealthy and dev...

Back to Top ↑

Privilege Escalation

SeManageVolumePrivilege Exploit

1 minute read

Abusing the SeManageVolumePrivilege allows low-privileged users to perform raw volume access — often used for LSASS dumping. However, a more stealthy and dev...

Back to Top ↑

webshell

Back to Top ↑

bypass

Back to Top ↑

windows security

Back to Top ↑

esc

Back to Top ↑

certipy

Back to Top ↑

red team

Back to Top ↑

faketime

timewrap: A Handy faketime Alias Using NTP

1 minute read

timewrap: Faketime + NTP Helper for AD Lab Environments. In Active Directory labs, we often need to manipulate system time to: Replay or inspect expired c...

Back to Top ↑

ntp

timewrap: A Handy faketime Alias Using NTP

1 minute read

timewrap: Faketime + NTP Helper for AD Lab Environments. In Active Directory labs, we often need to manipulate system time to: Replay or inspect expired c...

Back to Top ↑

bash

timewrap: A Handy faketime Alias Using NTP

1 minute read

timewrap: Faketime + NTP Helper for AD Lab Environments. In Active Directory labs, we often need to manipulate system time to: Replay or inspect expired c...

Back to Top ↑

zsh

timewrap: A Handy faketime Alias Using NTP

1 minute read

timewrap: Faketime + NTP Helper for AD Lab Environments. In Active Directory labs, we often need to manipulate system time to: Replay or inspect expired c...

Back to Top ↑

time manipulation

timewrap: A Handy faketime Alias Using NTP

1 minute read

timewrap: Faketime + NTP Helper for AD Lab Environments. In Active Directory labs, we often need to manipulate system time to: Replay or inspect expired c...

Back to Top ↑

virtualbox

Back to Top ↑

avx

Back to Top ↑

tensorflow

Back to Top ↑

llm

Back to Top ↑