elswix.com
Cybersecurity • Hacking • Red Teaming
Latest Articles
Today, we'll go over what UAC is and how it works at a high level, building on the concepts from my previous article.
Read more
In this article, we will dive into how Windows access tokens work and how they relate to SeImpersonatePrivilege exploitation.
Read more
Today, we'll delve into the fundamentals of Domain Trusts and how misconfigurations can be leveraged to achieve domain escalation/lateral movement.
Read more
Today, we will delve into how Certificate Mapping works, which security measurements were implemented after the Certifried vulnerability and more.
Read moreLatest WriteUps
Today, we'll walk through Kaiju, a hard-difficulty chain from VulnLab. This lab simulates a multi-host Active Directory environment.
Read more
Rebound is an insane difficulty machine on HackTheBox. Initially, we'll exploit RID brute force to obtain a list of valid users on the Domain Controller.
Read more
Analytics is an easy machine on HackTheBox. Firstly, we'll exploit a vulnerable version of Metabase to achieve command execution on the victim machine.
Read more
Manager is a medium-difficulty machine on HackTheBox. Initially, we'll abuse the guest session to perform a RID Bruteforce attack.
Read more