by guru | Mar 22, 2023 | Blueteam
Becoming a Junior Penetration Tester is a dream come true for many who are passionate about cybersecurity. However, getting there isn’t always easy. One of the most crucial parts of the journey is the interview process. In this post, we’ll go through everything you...
by The Ethical Hacking Guru | Jan 9, 2021 | Blueteam, Redteam
Like Kerberoasting, ASREPRoasting is an attack that ends with offline cracking of an encrypted password hash for an account in an Active Directory domain. All it takes is an account with DONT_REQ_PREAUTH enabled. From Microsoft, the definition of this setting:...
by The Ethical Hacking Guru | Jan 9, 2021 | Blueteam, Redteam
The recent news about the SolarWinds hack that involves dozens of government agencies has brought new attention to attack against service accounts through Kerberos manipulation, known as Kerberoasting. Although this is not the only serious attack method against...
by The Ethical Hacking Guru | Jan 26, 2020 | Hashcat, Redteam
There are hashcat tutorial guides and walkthroughs but actually good ones that are curated to provide a complete and practical use by ethical hackers are few and far between. As an Amazon Associate I earn from qualifying purchases. In this hashcat tutorial I am going...
by The Ethical Hacking Guru | Dec 4, 2019 | Blueteam, Openvas
This article covers the openvas tutorial, how to use openvas. I wrote a post on how to use Nessus check it out! You may be familiar with OpenVAS which stands for Open Vulnerability Assessment System a vulnerability scanning and management platform. When compared to...
by guru | Jul 19, 2019 | Blueteam, Impacket, Redteam, Responder
SMB is a common network protocol for attacks, and therefore it makes sense that Kali Linux comes with SMB exploitation tools installed. Others need to be installed and utilized, these are often conveniently located on Github. One such tool is Responder. Another tool...