Active Directory Attacks: Kerberoasting, AS-REP Roasting, Pass-the-Hash and DCSync
Deep dive into Active Directory attack techniques — Kerberoasting, AS-REP Roasting, Pass-the-Hash, DCSync, Golden Tickets and Bloo…
Deep dive into Active Directory attack techniques — Kerberoasting, AS-REP Roasting, Pass-the-Hash, DCSync, Golden Tickets and Bloo…
Master Wireshark for security work — capture and display filters, protocol dissection, detecting attacks, TLS decryption, file ext…
Master static malware analysis — PE header examination, strings extraction, YARA rules, Ghidra/IDA basics, import table analysis, …
Learn dynamic malware analysis — sandbox setup with REMnux and FlareVM, Process Monitor, API monitoring, detecting sandbox evasion…
Complete Nmap mastery guide — scan types, timing, OS detection, NSE script categories, output formats, firewall evasion with fragm…
Master Burp Suite Pro — proxy interception, Intruder attack types, Scanner, extensions, HTTP request smuggling, JWT attacks, Colla…
Master OSINT reconnaissance — theHarvester, Maltego, Shodan, subdomain enumeration, 20+ Google dorks, social media recon, certific…
Master threat intelligence OSINT — breach data analysis with HaveIBeenPwned API, dark web monitoring, paste site tracking, MISP/Op…
Master cryptographic attacks — hashcat modes and rules, John the Ripper, rainbow tables, Padding Oracle CBC attacks, RSA small exp…
Deep dive into TLS 1.2 and 1.3 handshakes, cipher suites, BEAST, CRIME, POODLE, Heartbleed, DROWN vulnerabilities, testssl.sh usag…