DCSync Attack
![DCSync](https://vandanpathak.com/wp-content/uploads/2023/09/apple-touch-icon.png)
Active Directory Exploitation - DCSync Attack - In Lab Demonstration Read more
Read More
Unconstrained Delegation Attack
![Kerberos Unconstrained Delegation](https://vandanpathak.com/wp-content/uploads/2023/12/Kerberos-Featured.png)
Active Directory Exploitation - Kerberos Unconstrained Delegation Attack - In Lab Demonstration Read more
Read More
Attacking Kerberos – Part 2
![](https://vandanpathak.com/wp-content/uploads/2023/10/Kerberos3.png)
Active Directory Exploitation - Attacking Kerberos Part 2 - In Lab exercise Read more
Read More
Attacking Kerberos – Part 1
![](https://vandanpathak.com/wp-content/uploads/2023/10/Kerberos3.png)
Active Directory Exploitation - Attacking Kerberos Part 1 - In Lab exercise Read more
Read More
Attacking AD Certificate Services – Part 3
![Windows Active Directory Exploitation ADCS](https://vandanpathak.com/wp-content/uploads/2023/09/AD_Attack_Image.jpg)
Attacking Active Directory Certificate Service (ADCS) Part 3 focusing on performing the privilege escalation using vulnerable AD CS service in Windows Domain. Read more
Read More
Attacking AD Certificate Services – Part 2
![Windows Active Directory Exploitation ADCS](https://vandanpathak.com/wp-content/uploads/2023/09/AD_Attack_Image.jpg)
Attacking Active Directory Certificate Service (ADCS) Part 2 - Focusing on uncovering some critical assets using certify and leveraging Windows Data Protection API Read more
Read More
Attacking AD Certificate Services – Part 1
![Windows Active Directory Exploitation ADCS](https://vandanpathak.com/wp-content/uploads/2023/09/AD_Attack_Image-Copy.jpg)
This blog covers Enumerating the AD services and attacking AD CS in windows environment. Read more
Read More