Hashar MujahidinInfoSec Write-upsMAN IN THE MIDDLE ATTACKS (MITM) [ LISTEN AND RELAY ] ATTACKS IN WINDOWS ACTIVE DIRECTORYHi! My Name is Hashar Mujahid and today we will see how to perform Man In The Middle Attacks in the Windows Active Directory Environment…8 min read·Mar 23, 2024----
Hashar MujahidinOSINT TEAMABUSING DELEGATIONS IN A WINDOWS ACTIVE DIRECTORY ENVIRONMENT PART 1.Hi, My Name is Hashar Mujahid and this blog will teach you how to abuse Delegations in a Windows active directory environment during a…7 min read·Mar 18, 2024----
Hashar MujahidinInfoSec Write-upsUser Enumeration Techniques and Tactics In an Active Directory Pentesting Engagement.Hi! My name is Hashar Mujahid and Today we will learn some techniques and ways by which we can enumerate valid users in an Active Directory…6 min read·Mar 14, 2024----
Hashar MujahidVISUAL MEDIUM HACKTHEBOXVisual is a medium-level hackthebox machine. In this blog, we are going to solve it.6 min read·Feb 26, 2024----
Hashar MujahidinInfoSec Write-upsRace Condition Vulnerabilities: A Hands-On Primer — Part 1Hi Everyone My name is Hashar Mujahid. I am a cyber security student and full-time freelancer. Today we will look at a topic that is…6 min read·Sep 14, 2023----
Hashar MujahidinInfoSec Write-upsFLIGHT [HACKTHEBOX] [HARD] [Writeup]Hi My name is Hashar Mujahid. I am a security researcher and Pentester. This is the writeup of Flight machine from HackTheBox.10 min read·May 6, 2023----
Hashar MujahidinInfoSec Write-upsJAVASCRIPT PROTOTYPE POLLUTION VULNERABILITIES PART 1 [ WHAT IS PROTOTYPE]Hi My name is Hashar Mujahid. I am a security researcher and Pentester. This is the first part of the prototype pollution vulnerabilities…5 min read·Apr 27, 2023----
Hashar MujahidinInfoSec Write-upsJAVASCRIPT DEOBFUSCATION FOR PENTESTER.Hi, My name is Hashar Mujahid, And today we are going to learn about what are JavaScript OBFUSCATION techniques and how we can deobfuscate…4 min read·Apr 14, 2023----
Hashar MujahidinInfoSec Write-upsJWT [JSON WEB TOKENS] [ ALGORITHM CONFUSION ATTACK] (0x03)Hi! My name is Hashar Mujahid. I am a security researcher and a penetration tester. This blog is part 3 of the comprehensive exploitation…6 min read·Apr 8, 2023----
Hashar MujahidinInfoSec Write-upsJWT [JSON WEB TOKENS] [EXPLANATION & EXPLOITATION] (0x02)Hi! My name is Hashar Mujahid. I am a security researcher and a penetration tester. This blog is part 2 of the comprehensive exploitation…6 min read·Mar 19, 2023--1--1