Skip to content
Iyad Al-Kassab

Iyad Al-Kassab

Personal blog – random posts and experiments

About

“Even while they teach, men learn” – Seneca

Recent Posts

  • Exploring and Abusing Windows Active Directory: common attack vectors on enterprise networks
  • CTF – HTB – Traceback
  • CTF – HTB – Mango
  • CTF – HTB – Registry
  • CTF – HTB – Ellingson
  • How-to : building your own crypto trading platform with nodeJS and Websockets
  • CTF – HTB – Traverxec
  • CTF – HTB – OpenAdmin
  • CTF – HTB – OneTwoSeven

Tags

  • AD (1)
  • ASLR (1)
  • bind shell (1)
  • CrackMapExec (1)
  • crypto (1)
  • curl (1)
  • DC (1)
  • DCsync (1)
  • docker (1)
  • gtfobins (3)
  • Impacket (1)
  • Java (1)
  • jjs (1)
  • john (4)
  • Kerberoasting (1)
  • LLMNR (1)
  • lua (1)
  • metasploit (1)
  • mimikatz (1)
  • mongoDB (1)
  • motd (1)
  • msfvenom (1)
  • nodejs (1)
  • noSQL (1)
  • NTLM (1)
  • php (4)
  • plotly (1)
  • Powersploit (1)
  • pwn tools (1)
  • python (1)
  • reprepro (1)
  • Responder (1)
  • restic (1)
  • ROP (1)
  • Server (1)
  • sftp (1)
  • ssh (1)
  • SUID (2)
  • unshadow (1)
  • websocket (1)
  • Windows (1)

Home

Home

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Exploring and Abusing Windows Active Directory: common attack vectors on enterprise networks

CTF – HTB – Traceback

CTF – HTB – Mango

CTF – HTB – Registry

personal blog @ ialkas