Share stories that are meaningful to you and connect with your audiences.
Click to sign in/sign up
Offensive security engineer at Redforce • https://0x4148.com
Kerberos authentication is one of the cores of the AD, knowing how it works facilitates the deep understanding of many attacks.
In order to understand attacks such as Pass the hash, relaying, Kerberos attacks, one should have pretty good knowledge about the windows Authentication / Authorization process. That’s what we’re going to achieve in this series. In this part we’re discussing the different types of windows hashes and focus on the NTLM authentication process.
A writeup regarding exploiting SQL injection issue in an insert query while it wasn’t possible to use a comma at my payload at all.
Extracting data without knowing columns names from MYSQL < 5 or in case of WAF blacklisting sending information_schema in the request