InInfoSec Write-upsbyNairuz AbulhulExploiting Misconfigurations in Windows Service PermissionsA Closer Look at Common Misconfigurations in Windows Service Permissions for Privilege EscalationJan 16, 2024Jan 16, 2024
InR3d Buck3TbyNairuz AbulhulCrackMapExec in Action: Enumerating Windows Networks (Part 2)Strategically Mapping Targets inside the Internal NetworkSep 27, 2023Sep 27, 2023
InInfoSec Write-upsbyNairuz AbulhulIntroduction to External Penetration Testing AssessmentsTesting the Waters: A Guide to External Penetration Testing MethodologySep 24, 20231Sep 24, 20231
InR3d Buck3TbyNairuz AbulhulCrackMapExec in Action: Enumerating Windows Networks (Part 1)Strategically Mapping Targets inside the Internal NetworkSep 20, 20231Sep 20, 20231
InR3d Buck3TbyNairuz AbulhulExternal Penetration Testing MethodologyHow to run an External Pentest AssessmentJan 11, 2023Jan 11, 2023
InR3d Buck3TbyNairuz AbulhulCertificate-based Authentication over WinRMAdvanced WinRM Security: Achieving Passwordless Authentication with Certificate-Based MethodsJun 14, 2023Jun 14, 2023
InR3d Buck3TbyNairuz AbulhulPrivilege Escalation with Insecure Windows Service PermissionsGuide to Privilege Escalation through Insecure Windows Service Permissions.Aug 29, 2023Aug 29, 2023
InR3d Buck3TbyNairuz AbulhulPwning Printers with LDAP Pass-Back AttackCapture credentials stored in multifunction printers — Return MachineDec 14, 2021Dec 14, 2021