Browse Skills

Executing Diamond Model Analysis

v1.0.0

>

mukul975
3

Executing Phishing Simulation Campaign

v1.0.0

>

mukul975
3

Executing Red Team Exercise

v1.0.0

>

mukul975
3

Exploiting Active Directory Certificate Services Esc1

v1.0.0

Exploit misconfigured Active Directory Certificate Services (AD CS) ESC1 vulnerability to request certificates as high-privileged users and escalate domain privileges during authorized red team assessments.

mukul975
3

Exploiting Active Directory With Bloodhound

v1.0.0

BloodHound is a graph-based Active Directory reconnaissance tool that uses graph theory to reveal hidden and unintended relationships within AD environments. Red teams use BloodHound to identify attac

mukul975
3

Exploiting Bgp Hijacking Vulnerabilities

v1.0.0

>

mukul975
4

Exploiting Broken Function Level Authorization

v1.0.0

>

mukul975
3

Exploiting Broken Link Hijacking

v1.0.0

Discover and exploit broken link hijacking vulnerabilities by identifying references to expired domains, decommissioned cloud resources, and dead external services that can be claimed by an attacker.

mukul975
2

Exploiting Constrained Delegation Abuse

v1.0.0

Exploit Kerberos Constrained Delegation misconfigurations in Active Directory to impersonate privileged users via S4U2self and S4U2proxy extensions for lateral movement and privilege escalation.

mukul975
6

Exploiting Deeplink Vulnerabilities

v1.0.0

>

mukul975
3

Exploiting Http Request Smuggling

v1.0.0

Detecting and exploiting HTTP request smuggling vulnerabilities caused by Content-Length and Transfer-Encoding parsing discrepancies between front-end and back-end servers.

mukul975
3

Exploiting Ipv6 Vulnerabilities

v1.0.0

>

mukul975
3