Tags

Active Directory (AD) is the backbone of authentication and authorization in most enterprise networks. One of the most powerful attacks against AD is the DCSync attack, which allows attackers to simulate the behavior of a Domain Controller (DC) and extract sensitive credential data, including password hashes and Kerberos keys.

AS-REP roasting abuses a common Active Directory misconfiguration to extract crackable password hashes without authentication or account lockouts, making it a stealthy and dangerous attack vector.

Kerberoasting is a powerful Active Directory attack technique that allows attackers to extract and crack service account credentials offline. In this post, we break down how Kerberoasting works, why it’s dangerous, and how to detect and mitigate it.

A concise technical overview of how Windows authentication works, from NTLM to Kerberos, and why it matters for security professionals.

[REPORT] Analysis: Hard Windows Box on Hack The Box

January 20, 2024

A detailed walkthrough of the Hack The Box “Analysis” hard Windows machine, covering LDAP injection, web-based command execution, credential discovery, lateral movement, and domain compromise via DCSync abuse.

[REPORT] Bizness (Hack The Box) Walkthrough

January 06, 2024

A step‑by‑step walkthrough of the Hack The Box Bizness machine, from initial recon to RCE in Apache OFBiz and final root compromise via password hash cracking.