✍️Writeups and Walkthroughs

Try Hack Me (THM)

tryhackme.com - © TryHackMe

Rooms

Active Directory

  • Active Directory Basics (This room will introduce the basic concepts and functionality provided by Active Directory)

  • AD: Basic Enumeration (This room covers various Active Directory enumeration techniques, their use cases as well as drawbacks)

  • Enumerating Active Directory (This room covers various Active Directory enumeration techniques, their use cases as well as drawbacks)

  • Breaching Active Directory (This network covers techniques and tools that can be used to acquire that first set of AD credentials that can then be used to enumerate AD)

  • Attacking Kerberos (Learn how to abuse the Kerberos Ticket Granting Service inside of a Windows Domain Controller)

  • Attacktive Directory (99% of Corporate networks run off of AD. But can you exploit a vulnerable Domain Controller?)

  • Exploiting Active Directory (Learn common AD exploitation techniques that can allow you to reach your goal in an AD environment)

  • Post-Exploitation Basics (Learn the basics of post-exploitation and maintaining access with mimikatz, bloodhound, powerview and msfvenom)

  • Lateral Movement and Pivoting (Learn about common techniques used to move laterally across a Windows network).

CTFs


Hack The Box (HTB)

hackthebox.com - © HACKTHEBOX

VulnHub


Vulnix

© VulNyx
  • Admin

DockerLabs


HomeMade Labs 🏠🔬


WAPT

Portswigger Web Security Academy

@PortSwigger Ltd

PortSwigger - Web Security Academy (My Walkthrough)


DVWA


OWASP - Mutillidae II


OWASP - SecureBank

  • Install and configure OWASP Secure Bank

Last updated