Skip to content
No results
  • Home
  • whoami
  • Contact Me
  • Courses
  • Blog
    • Walkthroughs
    • Active Directory Hacking
    • Windows Privilege Escalation
    • Linux Privilege Escalation
We use cookies to ensure that we give you the best experience on our website.
Juggernaut Pentesting Blog
Juggernaut Pentesting Academy
  • Home
  • whoami
  • Contact Me
  • Courses
  • Blog
    • Walkthroughs
    • Active Directory Hacking
    • Windows Privilege Escalation
    • Linux Privilege Escalation
Juggernaut Pentesting Blog
Juggernaut Pentesting Academy
  • Active Directory Hacking

Dumping Credentials – SAM File Hashes

In this post we will review various techniques that can be used to extract a copy of the SAM and SYSTEM files from a Windows host. We will explore how to do…

Read More
  • The Cyber Juggernaut
  • March 27, 2022
  • 3 Comments
  • Active Directory Hacking

Dumping Credentials – LSASS Process Hashes

In this post we are going to explore various tools and techniques we can use to dump the LSASS process. We will have a look at an example scenario and practical example…

Read More
  • The Cyber Juggernaut
  • March 25, 2022
  • 5 Comments
  • Active Directory Hacking

Dumping Credentials – LSA Domain Hashes

In this blog post we will be exploring how to dump all of the hashes in a domain using an LSA dump. To do this, we will be using three different versions…

Read More
  • The Cyber Juggernaut
  • March 23, 2022
  • 2 Comments
  • Active Directory Hacking

Domain Persistence – Golden Ticket and Silver Ticket Attacks

In this blog post we are going to explore both golden ticket and silver ticket attacks. We will use Mimikatz to forge both a golden and silver ticket and see how we…

Read More
  • The Cyber Juggernaut
  • March 20, 2022
  • 7 Comments
  • Active Directory Hacking

AS-REP Roasting

In this blog post we will look at how to perform AS-REP roasting in two different ways, how to use hashcat to crack a krbasrep5 hashes, and how to mitigate this type…

Read More
  • The Cyber Juggernaut
  • March 14, 2022
  • 6 Comments
  • Active Directory Hacking

Kerberoasting

In this blog post we will have a look at three different ways to perform kerberoasting, how to use hashcat to crack the service ticket (hash), and a few ways that we…

Read More
  • The Cyber Juggernaut
  • March 11, 2022
  • 4 Comments
Prev
1 … 4 5 6 7
  • Home
  • whoami
  • Contact Me
  • Courses
  • Blog

Copyright © 2023 Juggernaut Pentesting Blog

Twitter LinkedIn