Ever wonder what getting hacked looks like?
Active Directory Domains run their authentication with Kerberos, therefore we must break it. This is an introduction to the Kerberos protocol.
Setting up a network for a domain in the "elusive" cloud can prove to be a minor challenge when working with the pedantic syntax that Microsoft creates for its admins. Check out how to build a small network for a domain! (art by: https://twitter.com/yuwuta_ryebrook)
Going through some of the methods an attacker can use to privilege escalate in Windows based environments.
Recently, someone let me know of a CTF that actually had game hacking as a part of it so of course I had to take a crack at it. This is the first of two challenges for this exercise.