Greetings fellow hackers! Last here, today we will take a look at a well known technique used by attackers in AD environments, the infamous overpass-the-hash. [Read More]
Welcome to my blog! My name is last and here I write about my learning journey through the wonderful (and sometimes scary) world of cyber security. Feel free to stick around, nothing here is really too complex to understand (if I learnt it, you surely can too). If you want to contact me, head to the about me page where you will find my e-mail address and Twitter profile. Anyway, check out my blog posts down here.
Offensive Operations in Active Directory #0
Taming Kerberos and making it our loyal companion
To my good friend Vito and to the league of evil men. Let’s do some black wizardry, shall we? [Read More]
Tactical Debriefing - Offshore
Lessons learned by pwning the Offshore pro lab by HTB
Greetings everyone, last is back! So, on the 28th of September I played the RomHack CTF with my fellow mates from JBZ and we arrived third, thanks to a flag submitted at the last second (a typical CTF tactic to make the other teams relax and then pwn them at... [Read More]
My (ongoing) path to cyber security.
It's not about the destination, it's about the journey
Let’s track this from the beginning. [Read More]
Attacking and Defending Active Directory course review
Active Directory attacks, from zero to hero
Introduction It’s been almost two weeks since I took and passed the exam of the Attacking and Defending Active Directory course by Pentester Academy and I finally feel like doing a review. I was very excited to do this course as I didn’t have a lot of experience with Active... [Read More]