Skip to content
No results
  • Home
  • whoami
  • Contact Me
  • Courses
  • Blog
    • Walkthroughs
    • Active Directory Hacking
    • Windows Privilege Escalation
    • Linux Privilege Escalation
Juggernaut Pentesting Blog
Juggernaut Pentesting Academy
  • Home
  • whoami
  • Contact Me
  • Courses
  • Blog
    • Walkthroughs
    • Active Directory Hacking
    • Windows Privilege Escalation
    • Linux Privilege Escalation
Juggernaut Pentesting Blog
Juggernaut Pentesting Academy
  • Active Directory Hacking

Domain Privilege Escalation – CVE-2022-26923: CertiFried

In this post we will be deep-diving into a devastating CVE that was just was announced and patched on Tuesday, May 10th 2022: CVE-2022-26923 – CertiFried. To do this, we will be…

Read MoreDomain Privilege Escalation – CVE-2022-26923: CertiFried
  • The Cyber Juggernaut
  • May 19, 2022
  • Active Directory, Walkthroughs

Proving Grounds – Heist

In this Walkthrough, we will be hacking the machine Heist from Proving Grounds Practice. We will begin by finding an SSRF vulnerability on a web server that the target is hosting on…

Read MoreProving Grounds – Heist
  • The Cyber Juggernaut
  • May 14, 2022
  • 1 Comment
  • Active Directory Hacking

Window’s Persistence – Manual Techniques

For this post we will be exploring various techniques that can be used to establish persistence on a Windows victim. Since there are so many tools and techniques when it comes to…

Read MoreWindow’s Persistence – Manual Techniques
  • The Cyber Juggernaut
  • May 13, 2022
  • Active Directory, Walkthroughs

Proving Grounds – Hutch

In this Walkthrough, we will be hacking the machine Hutch from Proving Grounds Practice. To begin, we will utilize the ability to perform an anonymous LDAP search to dump account information where…

Read MoreProving Grounds – Hutch
  • The Cyber Juggernaut
  • May 7, 2022
  • Active Directory Hacking

Lateral Movement – NTLM Relay Attacks

In this post we will explore different techniques that can be used to perform NTLM relay attacks to move laterally and access different machines and resources in the network. To start, we…

Read MoreLateral Movement – NTLM Relay Attacks
  • The Cyber Juggernaut
  • May 5, 2022
  • Active Directory Hacking

AD Recon – LLMNR Poisoning with Responder

In this post we will go over the concept of LLMNR poisoning. To perform LLMNR poisoning we will execute a MITM (man-in-the-middle) attack using a tool called Responder. Using this tool we…

Read MoreAD Recon – LLMNR Poisoning with Responder
  • The Cyber Juggernaut
  • April 26, 2022
  • 3 Comments
  • Windows Privilege Escalation

Windows File Transfers For Hackers

For this post, we will be deep-diving into the art of Windows file transfers. We will go over various techniques on how to transfer files from our attacker machine onto a victim…

Read MoreWindows File Transfers For Hackers
  • The Cyber Juggernaut
  • April 19, 2022
  • 24 Comments
  • Windows Privilege Escalation

UAC-Bypass – Windows Privilege Escalation

In this post we will go over three different methods that can be used to perform UAC-bypass in order to elevate from a medium-integrity shell to a high-integrity shell. We will run…

Read MoreUAC-Bypass – Windows Privilege Escalation
  • The Cyber Juggernaut
  • April 13, 2022
  • 6 Comments
  • Active Directory Hacking

Lateral Movement – Over-Pass-the-Hash Attacks

In this post we will be demonstrating how to perform an over-pass-the-hash attack using rubeus.exe and getTGT.py. We will run through a quick example scenario where we have gotten a foothold on…

Read MoreLateral Movement – Over-Pass-the-Hash Attacks
  • The Cyber Juggernaut
  • April 8, 2022
  • 2 Comments
Prev
1 … 4 5 6 7 8
Next
  • Home
  • whoami
  • Contact Me
  • Courses
  • Blog

Copyright © 2025 Juggernaut Pentesting Blog