Pages

  • Home
  • Author
skip to main | skip to sidebar

Hacking Articles|Raj Chandel's Blog

RSS Feed

AWS: IAM CreateAccessKey Privilege Escalation

at 11:10 AM Wednesday, July 16, 2025 0 comments

 


















Labels: Penetration Testing

AWS: IAM AssumeRole Privilege Escalation

at 7:17 AM Saturday, July 12, 2025 0 comments

 













































Labels: Penetration Testing
Older Posts Home
Subscribe to: Posts (Atom)

Labels

  • Batch File tricks (8)
  • crytography (3)
  • CTF (100)
  • Cyber Forensics Tools (56)
  • DLL Hacking (6)
  • footprinting (2)
  • Google Hacking (1)
  • Hacking Tools (12)
  • Kali Linux (370)
  • others (5)
  • Penetration Testing (1324)
  • redteam (9)
  • Stegnography (7)
  • Windows Hacking (6)

Popular Posts

  • ADCS ESC10 - Weak Certificate Mapping
     
  • 64-bit Linux Assembly and Shellcoding
    Introduction Shellcodes are machine instructions that are used as a payload in the exploitation of a vulnerability. An exploit is a small ...
  • GreatSct - An Application Whitelist Bypass Tool
    While wrting Applocker bypass series , we found a new tool which was especially design for bypassing whitelisting application.  So Idecid...
  • Abusing AD-DACL : Generic ALL Permissions
      In this post, we explore the exploitation of Discretionary Access Control Lists (DACL) using the Generic ALL permission in Active Director...
  • Active Directory Pentesting Using Netexec Tool: A Complete Guide
    Active Directory (AD) penetration testing is an essential part of the security assessment of enterprise networks. The Netexec tool offers a...
  • MSSQL for Pentester: NetExec
    NetExec (nxc) is a powerful network exploitation tool developed as a modern successor to CrackMapExec (CME), which was widely used by penetr...
  • Credential Dumping: GMSA
    Abusing AD-DACL: ReadGMSAPassword ReadGMSAPassword Attack is a technique where attackers abuse misconfigured Group Managed Service Account...
  • Credential Dumping: AD User Comment
    In this article, we shall explore different tools & techniques that help us enumerate Active Directory (AD) users' passwords using w...
  • Abusing AD Weak Permission Pre2K Compatibility
    Pre2K (short for "Pre-Windows 2000") Active Directory misconfigurations often stem from overlooked legacy settings in Windows en...
  • Diamond Ticket Attack: Abusing kerberos Trust
    The Diamond Ticket attack represents a sophisticated escalation in Active Directory (AD) exploitation methods, leveraging intricate flaws in...
 

Copyright 2010 Hacking Articles|Raj Chandel's Blog. Theme zBench Bloggerized by Who Got Eliminated for Sports Master

Δ Top