Published inInfoSec Write-upsMAN IN THE MIDDLE ATTACKS (MITM) [ LISTEN AND RELAY ] ATTACKS IN WINDOWS ACTIVE DIRECTORYHi! My Name is Hashar Mujahid and today we will see how to perform Man In The Middle Attacks in the Windows Active Directory Environment…Mar 23, 20241Mar 23, 20241
Published inOSINT TeamABUSING DELEGATIONS IN A WINDOWS ACTIVE DIRECTORY ENVIRONMENT PART 1.Hi, My Name is Hashar Mujahid and this blog will teach you how to abuse Delegations in a Windows active directory environment during a…Mar 18, 2024Mar 18, 2024
Published inInfoSec Write-upsUser Enumeration Techniques and Tactics In an Active Directory Pentesting Engagement.Hi! My name is Hashar Mujahid and Today we will learn some techniques and ways by which we can enumerate valid users in an Active Directory…Mar 14, 2024Mar 14, 2024
VISUAL MEDIUM HACKTHEBOXVisual is a medium-level hackthebox machine. In this blog, we are going to solve it.Feb 26, 2024Feb 26, 2024
Published inInfoSec Write-upsRace Condition Vulnerabilities: A Hands-On Primer — Part 1Hi Everyone My name is Hashar Mujahid. I am a cyber security student and full-time freelancer. Today we will look at a topic that is…Sep 14, 2023Sep 14, 2023
Published inInfoSec Write-upsFLIGHT [HACKTHEBOX] [HARD] [Writeup]Hi My name is Hashar Mujahid. I am a security researcher and Pentester. This is the writeup of Flight machine from HackTheBox.May 6, 2023May 6, 2023
Published inInfoSec Write-upsJAVASCRIPT PROTOTYPE POLLUTION VULNERABILITIES PART 1 [ WHAT IS PROTOTYPE]Hi My name is Hashar Mujahid. I am a security researcher and Pentester. This is the first part of the prototype pollution vulnerabilities…Apr 27, 2023Apr 27, 2023
Published inInfoSec Write-upsJAVASCRIPT DEOBFUSCATION FOR PENTESTER.Hi, My name is Hashar Mujahid, And today we are going to learn about what are JavaScript OBFUSCATION techniques and how we can deobfuscate…Apr 14, 2023Apr 14, 2023
Published inInfoSec Write-upsJWT [JSON WEB TOKENS] [ ALGORITHM CONFUSION ATTACK] (0x03)Hi! My name is Hashar Mujahid. I am a security researcher and a penetration tester. This blog is part 3 of the comprehensive exploitation…Apr 8, 2023Apr 8, 2023
Published inInfoSec Write-upsJWT [JSON WEB TOKENS] [EXPLANATION & EXPLOITATION] (0x02)Hi! My name is Hashar Mujahid. I am a security researcher and a penetration tester. This blog is part 2 of the comprehensive exploitation…Mar 19, 20231Mar 19, 20231