Case Study

Mimikatz Comprehensive Cheatsheet

Mimikatz Comprehensive Book

We begin by delving into the history and evolution of Mimikatz, tracing its development from a simple password extraction tool to a multifaceted suite capable of advanced operations. The book then guides readers through the installation and configuration of Mimikatz, ensuring a solid foundation before progressing to more complex topics.

Pwning the Domain: AD CS

Pwning the Domain: AD CS EBook

The key finding is that AD CS, if not properly configured and secured, presents multiple vulnerabilities that can be exploited for domain escalation, persistence, and certificate theft. Attackers can leverage weak permissions, misconfigurations, and specific service vulnerabilities to gain and maintain unauthorized access, emphasizing the need for stringent security measures, regular audits, and adherence to …

Pwning the Domain: AD CS EBook Read More »

Threat Intel Roundup: Android, APT28, GHES, AMSI

Threat Intel Roundup: Android, APT28, GHES, AMSI

Week in Overview(30 Apr-7 May) – 2024 it is crucial for organizations and individuals to prioritize remediation and patching efforts to safeguard their systems and data. The following key findings highlight the importance of proactive measures to mitigate risks associated with various vulnerabilities and threats:

Pwning the Domain: Persistence

Pwning the Domain: Persistence EBook

Key findings from the “Pwning the Domain” series underscore the pervasive threat posed by attackers leveraging sophisticated techniques to exploit vulnerabilities within Windows domain environments. The series highlights the prevalence of persistence tactics, ranging from Group Policy manipulation and ticket-based attacks to the abuse of certificates and advanced techniques such as AdminSDHolder, GoldenGMSA, SID History, …

Pwning the Domain: Persistence EBook Read More »

Pwning the Domain: Lateral Movement

Pwning the Domain: Lateral Movement EBook

In summary, lateral movement in the domain of cybersecurity encompasses a myriad of techniques used by attackers to navigate through networks and systems. From password-based attacks to exploitation of authentication vulnerabilities and manipulation of enterprise systems, adversaries employ diverse tactics to gain and maintain access within targeted networks. Understanding these techniques and implementing robust security …

Pwning the Domain: Lateral Movement EBook Read More »

Free Consultation

For a Free Consultation And Analysis Of Your Business, Please Fill Out The Opposite Form, Our Team Will Contact You As Soon As Possible.