
Decode the Binary passwords
Decode the Binary passwords (.xml) PSCredential XML Decryption is the process of extracting and converting securely stored credentials from serialized PowerShell objects in XML format back to pl...

Decode the Binary passwords (.xml) PSCredential XML Decryption is the process of extracting and converting securely stored credentials from serialized PowerShell objects in XML format back to pl...

Reverse Shells in .NET Applications .NET is commonly used for Windows-compatible web applications (e.g., .aspx pages). Important: If you’re new to this attack flow, spin up a practice machine ...

DpApi attack DPAPI is Windows’ built-in encryption system that protects things like saved passwords and Wi-Fi keys. Attackers don’t break the encryption - they steal the keys to decrypt it. Pr...

GPO Group Policies are saved as Group Policy Objects (GPOs) which are then associated with Active Directory objects such as sites, domains, or organizational units (OUs). Domain members refresh Gr...

Voleur HTB Walkthrough for the Voleur machine (Active Directory). This document has been edited 0xmr Machine Information You start the Voleur box with credentials for the following account:...

SYSCO Lab Walkthrough Scenario Sysco is a Managed Service Provider that has tasked you to perform an external penetration testing on their active directory domain. You must obtain initial foothold...

Welcome Lab Walkthrough Objective / Scope You are a member of the Hack Smarter Red Team. During a phishing engagement you obtained credentials for the client’s Active Directory environment. Us...