What is Kerberosting

What is Kerberoasting ? The general concept of Kerberoasting is requesting service tickets (TGS) from the KDC (Kerberos Domain Controller) that are associated with service accounts to retrieve their hashes. Then, attempt to crack them offline with tools like Hashcat or John to recover the cleartext passwords to either escalate privileges vertically to become a local administrator or horizontally to access a set of different resources that can […]
How to find hidden directories in a website
The reconnaissance and scanning phases of a penetration test are arguably the most important of the entire process. Without a clear understanding of the bigger picture and the avenues potentially available to you, you won’t be going very far at all. As part of this process, it’s very likely that you regularly come up against […]
How to use Proxychains
Using a Linux-based operating system to hide your identity on the internet is quite simple, and you can do it all without paying for a VPN service like those available today. Kali Linux distributions are used to test the security of WiFi networks, websites, and servers, among other things. Operating systems like Debian and Ubuntu are also […]
Data privacy vs Data security

When it comes to data security and data privacy, these terms are often exchanged. Whether these are synonyms, closely connected with each other, or do have some differences,? Let’s clear this up in this post. Firms that manage and collect their data need protection and security in a timely manner. So what are privacy and […]
cyber security and cloud security

Introduction- In the age of digital world , data from almost every company is available in digital format. But as technology advances, cybercrime grows rapidly , making devices and data more exposed. As a result, it is important that businesses take steps to protect their data and sensitive information. The first thing that comes to mind when […]
Cybersecurity Interview Questions Part-4

In continuation of our interview series, here we are presenting the 4th part in our interview series. Let’s begin: Q1. How firewall can aid in malware mitigation? An enterprise firewall between your internal network and the Internet provides one layer of protection for the internal computers. However, not all threats come through the “front door” […]
