Open in app

Sign in

Write

Sign in

Hashar Mujahid
Hashar Mujahid

736 Followers

Home

Lists

About

Hashar Mujahid

Hashar Mujahid

in

InfoSec Write-ups

MAN IN THE MIDDLE ATTACKS (MITM) [ LISTEN AND RELAY ] ATTACKS IN WINDOWS ACTIVE DIRECTORY

Hi! My Name is Hashar Mujahid and today we will see how to perform Man In The Middle Attacks in the Windows Active Directory Environment…

Mar 23
1
MAN IN THE MIDDLE ATTACKS (MITM) [ LISTEN AND RELAY ] ATTACKS IN WINDOWS ACTIVE DIRECTORY
MAN IN THE MIDDLE ATTACKS (MITM) [ LISTEN AND RELAY ] ATTACKS IN WINDOWS ACTIVE DIRECTORY
Mar 23
1
Hashar Mujahid

Hashar Mujahid

in

OSINT Team

ABUSING DELEGATIONS IN A WINDOWS ACTIVE DIRECTORY ENVIRONMENT PART 1.

Hi, My Name is Hashar Mujahid and this blog will teach you how to abuse Delegations in a Windows active directory environment during a…

Mar 18
ABUSING DELEGATIONS IN A WINDOWS ACTIVE DIRECTORY ENVIRONMENT PART 1.
ABUSING DELEGATIONS IN A WINDOWS ACTIVE DIRECTORY ENVIRONMENT PART 1.
Mar 18
Hashar Mujahid

Hashar Mujahid

in

InfoSec Write-ups

User Enumeration Techniques and Tactics In an Active Directory Pentesting Engagement.

Hi! My name is Hashar Mujahid and Today we will learn some techniques and ways by which we can enumerate valid users in an Active Directory…

Mar 14
User Enumeration Techniques and Tactics In an Active Directory Pentesting Engagement.
User Enumeration Techniques and Tactics In an Active Directory Pentesting Engagement.
Mar 14
Hashar Mujahid

Hashar Mujahid

VISUAL MEDIUM HACKTHEBOX

Visual is a medium-level hackthebox machine. In this blog, we are going to solve it.

Feb 26
VISUAL MEDIUM HACKTHEBOX
VISUAL MEDIUM HACKTHEBOX
Feb 26
Hashar Mujahid

Hashar Mujahid

in

InfoSec Write-ups

Race Condition Vulnerabilities: A Hands-On Primer — Part 1

Hi Everyone My name is Hashar Mujahid. I am a cyber security student and full-time freelancer. Today we will look at a topic that is…

Sep 14, 2023
Race Condition Vulnerabilities: A Hands-On Primer — Part 1
Race Condition Vulnerabilities: A Hands-On Primer — Part 1
Sep 14, 2023
Hashar Mujahid

Hashar Mujahid

in

InfoSec Write-ups

FLIGHT [HACKTHEBOX] [HARD] [Writeup]

Hi My name is Hashar Mujahid. I am a security researcher and Pentester. This is the writeup of Flight machine from HackTheBox.

May 6, 2023
FLIGHT [HACKTHEBOX] [HARD] [Writeup]
FLIGHT [HACKTHEBOX] [HARD] [Writeup]
May 6, 2023
Hashar Mujahid

Hashar Mujahid

in

InfoSec Write-ups

JAVASCRIPT PROTOTYPE POLLUTION VULNERABILITIES PART 1 [ WHAT IS PROTOTYPE]

Hi My name is Hashar Mujahid. I am a security researcher and Pentester. This is the first part of the prototype pollution vulnerabilities…

Apr 27, 2023
JAVASCRIPT PROTOTYPE POLLUTION VULNERABILITIES PART 1 [ WHAT IS PROTOTYPE]
JAVASCRIPT PROTOTYPE POLLUTION VULNERABILITIES PART 1 [ WHAT IS PROTOTYPE]
Apr 27, 2023
Hashar Mujahid

Hashar Mujahid

in

InfoSec Write-ups

JAVASCRIPT DEOBFUSCATION FOR PENTESTER.

Hi, My name is Hashar Mujahid, And today we are going to learn about what are JavaScript OBFUSCATION techniques and how we can deobfuscate…

Apr 14, 2023
JAVASCRIPT DEOBFUSCATION FOR PENTESTER.
JAVASCRIPT DEOBFUSCATION FOR PENTESTER.
Apr 14, 2023
Hashar Mujahid

Hashar Mujahid

in

InfoSec Write-ups

JWT [JSON WEB TOKENS] [ ALGORITHM CONFUSION ATTACK] (0x03)

Hi! My name is Hashar Mujahid. I am a security researcher and a penetration tester. This blog is part 3 of the comprehensive exploitation…

Apr 8, 2023
JWT [JSON WEB TOKENS] [ ALGORITHM CONFUSION ATTACK] (0x03)
JWT [JSON WEB TOKENS] [ ALGORITHM CONFUSION ATTACK] (0x03)
Apr 8, 2023
Hashar Mujahid

Hashar Mujahid

in

InfoSec Write-ups

JWT [JSON WEB TOKENS] [EXPLANATION & EXPLOITATION] (0x02)

Hi! My name is Hashar Mujahid. I am a security researcher and a penetration tester. This blog is part 2 of the comprehensive exploitation…

Mar 19, 2023
1
JWT [JSON WEB TOKENS] [EXPLANATION & EXPLOITATION] (0x02)
JWT [JSON WEB TOKENS] [EXPLANATION & EXPLOITATION] (0x02)
Mar 19, 2023
1
Hashar Mujahid

Hashar Mujahid

736 Followers

Security Researcher

Help

Status

About

Careers

Press

Blog

Privacy

Terms

Text to speech

Teams