✍️Writeups and Walkthroughs

Try Hack Me (THM)

Rooms
Active Directory
Active Directory Basics (This room will introduce the basic concepts and functionality provided by Active Directory)
AD: Basic Enumeration (This room covers various Active Directory enumeration techniques, their use cases as well as drawbacks)
Enumerating Active Directory (This room covers various Active Directory enumeration techniques, their use cases as well as drawbacks)
Breaching Active Directory (This network covers techniques and tools that can be used to acquire that first set of AD credentials that can then be used to enumerate AD)
Attacking Kerberos (Learn how to abuse the Kerberos Ticket Granting Service inside of a Windows Domain Controller)
Attacktive Directory (99% of Corporate networks run off of AD. But can you exploit a vulnerable Domain Controller?)
Exploiting Active Directory (Learn common AD exploitation techniques that can allow you to reach your goal in an AD environment)
Post-Exploitation Basics (Learn the basics of post-exploitation and maintaining access with mimikatz, bloodhound, powerview and msfvenom)
Lateral Movement and Pivoting (Learn about common techniques used to move laterally across a Windows network).
CTFs
Hack The Box (HTB)

Chemistry - OnGoing
Celestial - OnGoing
Poison - OnGoing
VulnHub
Vulnix

Admin
DockerLabs
HomeMade Labs 🏠🔬
WAPT
Portswigger Web Security Academy

PortSwigger - Web Security Academy (My Walkthrough)
DVWA
OWASP - Mutillidae II
OWASP - SecureBank
Install and configure OWASP Secure Bank
Last updated