Reports
Intelligence reports and findings
Tags
Reports
A handcrafted Burp Suite extension that integrates Discord Rich Presence. Built using the Montoya API with real-time activity tracking, scope detection, and minimal resource usage.
MongoBleed (CVE-2025-14847) is a critical unauthenticated MongoDB vulnerability that allows remote attackers to leak uninitialized server memory via a zlib decompression flaw. This deep-dive explains the root cause, exploitation techniques, detection methods, and mitigation strategies to protect exposed MongoDB deployments.
A practical guide to Windows logon types and their security impact. Explains how each logon type affects credential exposure, lateral movement, and detection, with real-world offensive and defensive insights.
Active Directory (AD) is the backbone of authentication and authorization in most enterprise networks. One of the most powerful attacks against AD is the DCSync attack, which allows attackers to simulate the behavior of a Domain Controller (DC) and extract sensitive credential data, including password hashes and Kerberos keys.
AS-REP roasting abuses a common Active Directory misconfiguration to extract crackable password hashes without authentication or account lockouts, making it a stealthy and dangerous attack vector.
Kerberoasting is a powerful Active Directory attack technique that allows attackers to extract and crack service account credentials offline. In this post, we break down how Kerberoasting works, why it’s dangerous, and how to detect and mitigate it.
A concise technical overview of how Windows authentication works, from NTLM to Kerberos, and why it matters for security professionals.
A detailed walkthrough of the Hack The Box “Analysis” hard Windows machine, covering LDAP injection, web-based command execution, credential discovery, lateral movement, and domain compromise via DCSync abuse.
[REPORT] Bizness (Hack The Box) Walkthrough
A step‑by‑step walkthrough of the Hack The Box Bizness machine, from initial recon to RCE in Apache OFBiz and final root compromise via password hash cracking.