Hashar MujahidinInfoSec Write-upsMAN IN THE MIDDLE ATTACKS (MITM) [ LISTEN AND RELAY ] ATTACKS IN WINDOWS ACTIVE DIRECTORYHi! My Name is Hashar Mujahid and today we will see how to perform Man In The Middle Attacks in the Windows Active Directory Environment…Mar 232Mar 232
Hashar MujahidinOSINT TeamABUSING DELEGATIONS IN A WINDOWS ACTIVE DIRECTORY ENVIRONMENT PART 1.Hi, My Name is Hashar Mujahid and this blog will teach you how to abuse Delegations in a Windows active directory environment during a…Mar 181Mar 181
Hashar MujahidinInfoSec Write-upsUser Enumeration Techniques and Tactics In an Active Directory Pentesting Engagement.Hi! My name is Hashar Mujahid and Today we will learn some techniques and ways by which we can enumerate valid users in an Active Directory…Mar 14Mar 14
Hashar MujahidVISUAL MEDIUM HACKTHEBOXVisual is a medium-level hackthebox machine. In this blog, we are going to solve it.Feb 26Feb 26
Hashar MujahidinInfoSec Write-upsRace Condition Vulnerabilities: A Hands-On Primer — Part 1Hi Everyone My name is Hashar Mujahid. I am a cyber security student and full-time freelancer. Today we will look at a topic that is…Sep 14, 2023Sep 14, 2023
Hashar MujahidinInfoSec Write-upsFLIGHT [HACKTHEBOX] [HARD] [Writeup]Hi My name is Hashar Mujahid. I am a security researcher and Pentester. This is the writeup of Flight machine from HackTheBox.May 6, 2023May 6, 2023
Hashar MujahidinInfoSec Write-upsJAVASCRIPT PROTOTYPE POLLUTION VULNERABILITIES PART 1 [ WHAT IS PROTOTYPE]Hi My name is Hashar Mujahid. I am a security researcher and Pentester. This is the first part of the prototype pollution vulnerabilities…Apr 27, 2023Apr 27, 2023
Hashar MujahidinInfoSec Write-upsJAVASCRIPT DEOBFUSCATION FOR PENTESTER.Hi, My name is Hashar Mujahid, And today we are going to learn about what are JavaScript OBFUSCATION techniques and how we can deobfuscate…Apr 14, 2023Apr 14, 2023
Hashar MujahidinInfoSec Write-upsJWT [JSON WEB TOKENS] [ ALGORITHM CONFUSION ATTACK] (0x03)Hi! My name is Hashar Mujahid. I am a security researcher and a penetration tester. This blog is part 3 of the comprehensive exploitation…Apr 8, 2023Apr 8, 2023
Hashar MujahidinInfoSec Write-upsJWT [JSON WEB TOKENS] [EXPLANATION & EXPLOITATION] (0x02)Hi! My name is Hashar Mujahid. I am a security researcher and a penetration tester. This blog is part 2 of the comprehensive exploitation…Mar 19, 20231Mar 19, 20231