Threat Modeling
Threat Modeling Assalamo Alaykom Friends , Welcome to another blog in our series on Threat Intelligence. After covering the fundamentals of Cyber Threat Intelligence (CTI)
Threat Modeling Assalamo Alaykom Friends , Welcome to another blog in our series on Threat Intelligence. After covering the fundamentals of Cyber Threat Intelligence (CTI)
Intelligence Requirements Assalamo Alaykom Friends , Welcome to another blog in our series on Threat Intelligence. After covering the fundamentals of Cyber Threat Intelligence (CTI), today we’l...
Threat Intelligence Fundamentals : Hello friends, and welcome to a new blog! I’ve decided to start a blog series on Cyber Threat Intelligence, where I’ll explore key topics in the field. To pro...
ETW : A POWERFUL LOGGING MECHANISM Hello friends, and welcome to a new blog! In this blog, I’ve chosen to explain the intricacies of the Event Tracing for Windows (ETW) mechanism and how it con...
KERBEROASTING : WALKTHROUGH , DETECTION AND MITIGATION Welcome to a new blog in our series on Active Directory attacks and exploitations! In this blog, I’ll simplify the concept of Kerberoasting...
TOKEN IMPERSONATION Welcome to another blog concerning Active Directory Hacking! This time I chose to talk about TOKEN IMPERSONATION, so let’s discover some hacking stuff! OVERVIEW When an attac...
IPV6 ATTACK : Walkthrough and Mitigations OVERVIEW In an Active Directory environment, The IPV6 is enabled in some machines, However, when attempting to reach the IPv6 DNS server, the request get...
LLMNR POISONING In this blog i’m gonna explain one of the most used attack in active directory hacking. LLMNR or LOCAL LINK MULTICAST NAME RESOLUTION is a protocol used by windo...