Phantom DLL HijackingAugust 3, 2024· 6 min read#red-teaming#malware-development#exploit-development#offsec
Creating your first Offensive DLLAugust 1, 2024· 9 min read#red-teaming#malware-development#exploit-development#offsec
Offsec AD (Part 6) : LLMNR Poisoning & NTLMv2 Hash GrabbingJuly 28, 2023· 13 min read#offsec#active-directory#ad-lab#ntlm#network-analysis#llmnr-poisoning#responder#relay-attacks
Offsec AD (Part 5) : NTLM Authentication & Network AnalysisJuly 26, 2023· 19 min read#offsec#active-directory#ad-lab#ntlm#network-analysis#authentication
Offsec AD (Part 4) : AD Structure & Automation via Active Direcory ModuleJuly 23, 2023· 15 min read#offsec#active-directory#ad-lab#automation
Offsec AD (Part 3) : Setting up Kali VM & Resolving NetworkJuly 22, 2023· 4 min read#offsec#active-directory#ad-lab
Offsec AD (Part 2) : Linking Domain Users and Domain ComputersJuly 20, 2023· 4 min read#offsec#active-directory#ad-lab
Offsec AD (Part 1) : Setting Up Domain ControllerJuly 19, 2023· 7 min read#offsec#active-directory#ad-lab