Vulnhub Orcus Walkthough

Walk-through of Orcus machine from VulnHub
The rest →

Post OSCP Series Part 5

Persistence techniques and Desired State Configuration
The rest →

Post OSCP Series Part 4

A long form, multi path example of Active Directory exploitation using several techniques
The rest →

Post OSCP Series Part 3

A broad-ranging overview of Active Directory enumeration with PowerView
The rest →

Post OSCP Series Part 2

Overview of Kerberoasting, and examples of use
The rest →

Post OSCP Series Part 1

A little bit about payloads, PoshC2
The rest →