Tags

Reports

A handcrafted Burp Suite extension that integrates Discord Rich Presence. Built using the Montoya API with real-time activity tracking, scope detection, and minimal resource usage.

3 0 0

MongoBleed (CVE-2025-14847) is a critical unauthenticated MongoDB vulnerability that allows remote attackers to leak uninitialized server memory via a zlib decompression flaw. This deep-dive explains the root cause, exploitation techniques, detection methods, and mitigation strategies to protect exposed MongoDB deployments.

2 0 0

[REPORT] Windows Logon Types: A Security Professional's Guide

· 12 min read

A practical guide to Windows logon types and their security impact. Explains how each logon type affects credential exposure, lateral movement, and detection, with real-world offensive and defensive insights.

1 0 0

[REPORT] DCSync Attack: Stealing Password Hashes from Active Directory

· 2 min read

Active Directory (AD) is the backbone of authentication and authorization in most enterprise networks. One of the most powerful attacks against AD is the DCSync attack, which allows attackers to simulate the behavior of a Domain Controller (DC) and extract sensitive credential data, including password hashes and Kerberos keys.

0 0 0

[REPORT] AS-REP Roasting: A Stealthy Active Directory Attack Explained

· 7 min read

AS-REP roasting abuses a common Active Directory misconfiguration to extract crackable password hashes without authentication or account lockouts, making it a stealthy and dangerous attack vector.

0 0 0

[REPORT] Kerberoasting: Attacking Service Accounts in Active Directory

· 4 min read

Kerberoasting is a powerful Active Directory attack technique that allows attackers to extract and crack service account credentials offline. In this post, we break down how Kerberoasting works, why it’s dangerous, and how to detect and mitigate it.

0 0 0

[REPORT] Windows Authentication Explained (Short & Practical)

· 1 min read

A concise technical overview of how Windows authentication works, from NTLM to Kerberos, and why it matters for security professionals.

0 0 0

[REPORT] Analysis: Hard Windows Box on Hack The Box

· 6 min read

A detailed walkthrough of the Hack The Box “Analysis” hard Windows machine, covering LDAP injection, web-based command execution, credential discovery, lateral movement, and domain compromise via DCSync abuse.

1 0 0

[REPORT] Bizness (Hack The Box) Walkthrough

· 4 min read

A step‑by‑step walkthrough of the Hack The Box Bizness machine, from initial recon to RCE in Apache OFBiz and final root compromise via password hash cracking.

0 0 0