Skip to content
No results
  • Home
  • whoami
  • Contact Me
  • Courses
  • Blog
    • Walkthroughs
    • Active Directory Hacking
    • Windows Privilege Escalation
    • Linux Privilege Escalation
Juggernaut Pentesting Blog
Juggernaut Pentesting Academy
  • Home
  • whoami
  • Contact Me
  • Courses
  • Blog
    • Walkthroughs
    • Active Directory Hacking
    • Windows Privilege Escalation
    • Linux Privilege Escalation
Juggernaut Pentesting Blog
Juggernaut Pentesting Academy
  • Active Directory Hacking

Lateral Movement – Pass-the-Hash Attacks

In this post we will take a look A LOT of tools and techniques that can be used to perform a pass-the-hash attack. First, we will dump the local SAM file hashes…

Read MoreLateral Movement – Pass-the-Hash Attacks
  • The Cyber Juggernaut
  • April 4, 2022
  • 16 Comments
  • Windows Privilege Escalation

SeBackupPrivilege – Windows Privilege Escalation

In this post we are going to extract a copy of the SAM and SYSTEM file from a Windows Server using a service account that has SeBackupPrivilege enabled. We will have a…

Read MoreSeBackupPrivilege – Windows Privilege Escalation
  • The Cyber Juggernaut
  • March 31, 2022
  • 3 Comments
  • Active Directory Hacking

Dumping Credentials – SAM File Hashes

In this post, we are going to review various techniques that can be used to dump the local SAM file hashes from a Windows host. To begin, we will examine a scenario…

Read MoreDumping Credentials – SAM File Hashes
  • The Cyber Juggernaut
  • March 27, 2022
  • 3 Comments
  • Active Directory Hacking

Dumping Credentials – LSASS Process Hashes

In this post, we are going to explore various tools and techniques that we can use to dump the LSASS process and extract the hashes within. To begin, we will see two…

Read MoreDumping Credentials – LSASS Process Hashes
  • The Cyber Juggernaut
  • March 25, 2022
  • 5 Comments
  • Active Directory Hacking

Dumping Credentials – LSA Domain Hashes

In this blog post we will be exploring how to dump all of the hashes in a domain using an LSA dump. To do this, we will be using three different versions…

Read MoreDumping Credentials – LSA Domain Hashes
  • The Cyber Juggernaut
  • March 23, 2022
  • 2 Comments
  • Active Directory Hacking

Domain Persistence – Golden Ticket and Silver Ticket Attacks

In this blog post we are going to explore both golden ticket and silver ticket attacks. We will use Mimikatz to forge both a golden and silver ticket and see how we…

Read MoreDomain Persistence – Golden Ticket and Silver Ticket Attacks
  • The Cyber Juggernaut
  • March 20, 2022
  • 7 Comments
  • Active Directory Hacking

AD Recon – AS-REP Roasting Attacks

In this blog post, we will learn about AS-REP Roasting attacks and how they can be performed both remotely as well as from a foothold on a target host in the domain.…

Read MoreAD Recon – AS-REP Roasting Attacks
  • The Cyber Juggernaut
  • March 14, 2022
  • 6 Comments
  • Active Directory Hacking

AD Escalation – Kerberoasting Attacks

In this blog post, we will explore multiple ways to perform a kerberoasting attack in an Active Directory environment. To begin, we will briefly learn about Kerberos and how a kerberoasting attack…

Read MoreAD Escalation – Kerberoasting Attacks
  • The Cyber Juggernaut
  • March 11, 2022
  • 4 Comments
Prev
1 … 5 6 7 8
  • Home
  • whoami
  • Contact Me
  • Courses
  • Blog

Copyright © 2025 Juggernaut Pentesting Blog