How NTLM Authentication Works
Detailed explanation of how NTLM authentication works in Windows, including LM and NT hashes, the Net-NTLMv2 process, and techniques like Pass The Hash.
119 articles
Detailed explanation of how NTLM authentication works in Windows, including LM and NT hashes, the Net-NTLMv2 process, and techniques like Pass The Hash.
Techniques for escalating privileges in Windows through passwords stored in the registry, configuration files, saved credentials, and SAM hash extraction.
Learn to identify and exploit misconfigured graphical applications in Windows to escalate privileges using GUI exploitation techniques.
Learn what Windows services are, how they work, the different types of privilege escalation related to services, and enumeration techniques with accesschk.exe.
Learn to identify and exploit Windows services with unquoted paths to escalate privileges using Unquoted Service Path techniques.
Complete review of INE Security's eCPPTv2 certification: advanced pentesting course, complex labs, pivoting exam, and my experience obtaining the certification.
Learn to escalate privileges on Windows through kernel exploits, vulnerability enumeration, and tools like WESNG and Watson.
Manual exploitation of Buffer Overflow in SLMail 5.5, from fuzzing to obtaining a reverse shell, controlling the EIP and avoiding badchars.
Explanation of Path Hijacking and Library Hijacking privilege escalation techniques on Linux, how to exploit them through PATH manipulation, and practical examples with SUID permissions and sudo.
If you like the content and want to support the project, you can buy me a coffee. Your support helps keep the site active and create more quality content.
Buy me a coffeeThanks for your support 🙏