Academy
Lateral Movement
Exploiting the Active Directory environment and compromising the domain controller.
Browse all articles in Academy
Exploiting the Active Directory environment and compromising the domain controller.
Finding a way into the internal infrastructure. Prototype pollution, popping shells, for fun, and for profit.
What happens when you run scripts without checking the contents properly?
This article will explain some of the common HTTP state interception methods.