<feed xmlns="http://www.w3.org/2005/Atom"> <id>https://wwwgeneral.github.io/</id><title>wwwGeneral</title><subtitle>I post cool stuff that I learned about redteaming/pentesting.</subtitle> <updated>2026-04-05T16:27:02+02:00</updated> <author> <name>wwwGeneral</name> <uri>https://wwwgeneral.github.io/</uri> </author><link rel="self" type="application/atom+xml" href="https://wwwgeneral.github.io/feed.xml"/><link rel="alternate" type="text/html" hreflang="en" href="https://wwwgeneral.github.io/"/> <generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator> <rights> © 2026 wwwGeneral </rights> <icon>/assets/img/favicons/favicon.ico</icon> <logo>/assets/img/favicons/favicon-96x96.png</logo> <entry><title>Write Up HackDay 2024: The Analyst</title><link href="https://wwwgeneral.github.io/posts/writeup-hackday-the-analyst/" rel="alternate" type="text/html" title="Write Up HackDay 2024: The Analyst" /><published>2024-03-31T17:00:00+02:00</published> <updated>2024-03-31T19:16:02+02:00</updated> <id>https://wwwgeneral.github.io/posts/writeup-hackday-the-analyst/</id> <content src="https://wwwgeneral.github.io/posts/writeup-hackday-the-analyst/" /> <author> <name>wwwGeneral</name> </author> <category term="CTF" /> <category term="Forensic" /> <summary>This is the official write-up of the forensic challenge &amp;quot;The Analyst&amp;quot; which took place during the 2024 HackDay finals</summary> </entry> <entry><title>La sécurité des protocoles d’authentification NTLM et Kerberos en environnement Active Directory</title><link href="https://wwwgeneral.github.io/posts/la-s%C3%A9curit%C3%A9-des-protocoles-d-authentification-ntlm-et-kerberos-en-environnement-active-directory/" rel="alternate" type="text/html" title="La sécurité des protocoles d’authentification NTLM et Kerberos en environnement Active Directory" /><published>2023-09-27T20:00:00+02:00</published> <updated>2024-03-31T01:21:49+01:00</updated> <id>https://wwwgeneral.github.io/posts/la-s%C3%A9curit%C3%A9-des-protocoles-d-authentification-ntlm-et-kerberos-en-environnement-active-directory/</id> <content src="https://wwwgeneral.github.io/posts/la-s%C3%A9curit%C3%A9-des-protocoles-d-authentification-ntlm-et-kerberos-en-environnement-active-directory/" /> <author> <name>wwwGeneral</name> </author> <category term="Microsoft" /> <category term="Active Directory" /> <summary>Cet article explique le fonctionnement de NTLM dans ces différentes versions et de Kerberos v5 au sein de l’environnement Active Directory. Les différences entre ces protocoles seront étudiées, ainsi que les attaques liées à ces protocoles.</summary> </entry> <entry><title>From unprivileged user to system - KrbRelayUp</title><link href="https://wwwgeneral.github.io/posts/from-unprivileged-user-to-system-krbrelayup/" rel="alternate" type="text/html" title="From unprivileged user to system - KrbRelayUp" /><published>2023-01-19T21:42:00+01:00</published> <updated>2024-03-31T19:01:30+02:00</updated> <id>https://wwwgeneral.github.io/posts/from-unprivileged-user-to-system-krbrelayup/</id> <content src="https://wwwgeneral.github.io/posts/from-unprivileged-user-to-system-krbrelayup/" /> <author> <name>wwwGeneral</name> </author> <category term="Microsoft" /> <category term="Windows" /> <summary>In this article, I will show you a very useful exploit that allows you to perform a privilege escalation in a Windows environment. From an unprivileged user to nt autority\system.</summary> </entry> </feed>
