Categories
Tags
2025
15 posts
04-22
Exploiting Misconfigured ACLs: From Privilege Escalation to Domain Compromise
04-22
Abusing Active Directory Certificate Services (AD CS) for Privilege Escalation
04-22
Abusing Group Policy Objects (GPOs) for Privilege Escalation and Domain Compromise
04-22
Escalate with Generic Write: From File Modification to Full System Compromise
04-22
Exploiting LLMNR Poisoning: From Hash Theft to Domain Compromise
04-22
Exploiting journalctl: From Log Analysis to System Compromise
04-22
Golden Ticket & Scheduled Tasks: Domain Persistence Through Kerberos Exploitation
04-22
Impersonation Token Attack: Exploiting SE_IMPERSONATE_PRIVILEGE for Privilege Escalation
04-22
Exploiting SQL Server TRUSTWORTHY Property: From Database Access to sysadmin
04-22
Weaponizing Splunk Universal Forwarder: From Log Collection to System Compromise
04-22
Exploiting Active Sessions Management Vulnerabilities
04-20
Abusing Trusted Domain Controllers: From Privilege Escalation to Domain Domination
04-20
The VSSAdmin Dumping Attack: Extracting Sensitive Data via Shadow Copies
04-19
Abusing Sudo Binaries for Privilege Escalation
04-19
Abusing Scheduled Tasks: From Privilege Escalation to Full System Compromise