top of page
Blog Posts

Dec 14, 20217 min read
Exploiting log4j | Apache Solr
Log4j is a popular Java library maintained by the Apache foundation used as a logging framework for Java. Around Friday 10th December...
7,8150

Jan 9, 20224 min read
Unleashing the Power of Hydra for Brute Force Login Attacks
Hydra is a very powerful and fast password cracking tool which can also perform dictionary attacks against a wide range of protocols such...
35,747 views0 comments

Dec 14, 20217 min read
Exploiting log4j | Apache Solr
Log4j is a popular Java library maintained by the Apache foundation used as a logging framework for Java. Around Friday 10th December...
7,815 views0 comments

Dec 8, 20216 min read
Enumerating Active Directory using BloodHound.
90% of the Global Fortune 1000 companies use Active Directory as their primary method of authentication and authorization. This plays a...
1,823 views0 comments

Nov 28, 20214 min read
Exploiting EternalBlue | MS17-010
In this blog we will be walking though a machine from the Cybermentors course; Practical Ethical Hacking (PEH). The main lesson from this...
1,856 views0 comments

Nov 18, 20213 min read
Golden Ticket attacks
Once we have compromised a Domain Controller we want to gain a level of persistence on the domain. We can do this by crafting Golden-Tickets
103 views0 comments

Nov 18, 20214 min read
Attacktive Directory
This will be my first of many Active Directory themed blogs focused around exploitation. I have recently been exposed to a lot of Active...
774 views0 comments
bottom of page