DEF CON 32 Workshops are posted!
| Blog | https://cybergladius.com |
| https://twitter.com/CyberGladius | |
| GitHub | https://github.com/Brets0150 |
| Blog | https://cybergladius.com |
| https://twitter.com/CyberGladius | |
| GitHub | https://github.com/Brets0150 |
DEF CON 32 Workshops are posted!
Planning on going to DEF CON 32 this year? You need to read this before June 15th!
Preventing DCSync Attacks is complicated! If you dig into the root vulnerability, you realize most posts miss some attack paths.
So, I wrote a blog post on digging into the details of the attack.
The Active Directory Access Control List is one of the most confusing security risks I have ever encountered. So, I wrote up a blog to help others understand the AD ACL.
https://cybergladius.com/the-active-directory-access-control-list-explained/
Many Active Directory attacks' root vulnerability is the domain's AD Access Control Lists. This post explains what you need to know about the AD Access Control List to prevent lateral movement and escalation of privileges in the domain.
I really enjoyed this Pentesting story. The practical day-to-day challenge of being a pentester trying to break into a company with good security practices. Reading it reminded me of how stressed I felt a week into a pentest and still had not gotten a foothold; a little PTSD.
https://www.rapid7.com/blog/post/2023/08/31/pentales-what-its-like-on-the-red-team/