mrci0x1
CtrlK
H1HTB
  • #️whoami
  • WEB APP
    • Bug Hunting
      • Bypass of Username Policy: Breaking the Rules with a Simple Trick
      • Sensitive Data Exposure in a Moodle Config File
      • Exposed Sensitive Logs and SQL Queries Revealing User Data
  • Network
    • Pivoting, Tunneling, and Port Forwarding
      • Port Forwarding
      • Socat
      • Plink, Sshuttle, Rpivot, and Netsh Unleashed
      • Dnscat2, Chisel, Ptunnel-ng, and SocksOverRDP Tunneling Techniques
    • Active Directory Enumeration and Attacks
      • Tools
      • External and Internal Enumeration
      • LLMNR/NBT-NS & Spraying for AD Access
      • Internal Password Spraying Attack
      • Credentialed Enumeration
      • Enumerating Security Controls
      • Kerberoasting Attack
      • ACE the Hole
      • ACL Abuse
      • Privileged Access
      • Kerberos Attack Methods with Double Hop Workarounds
      • Bleeding Edge Vulnerabilities
      • Miscellaneous Misconfigurations
      • Trusting
    • Windows Privilege Escalation
      • Initial Assessment
      • User Privileges
      • Group Privileges
      • Attacking the OS
      • Credential Theft
      • Citrix Breakout
      • Additional Techniques
    • HTB
      • Boxes
        • Fluffy
        • TombWatcher
Powered by GitBook
Page cover
On this page

#️whoami

Bug bounty hunter and pentester ,I break things to make them better. Focused, curious, and always chasing the next flaw in the system.

NextBug Hunting

Last updated 16 days ago