• News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • Log In
  • Sign Up
  • No bullshit
  • Cookie Policy
  • Privacy Policy
Log In / Sign Up

Author: RalfHacker

Gathering User Data in Windows Networks: Exploring Active Directory Without Privileges
Security

Gathering User Data in Windows Networks: Exploring Active Directory Without…

2 months ago27/07/2025RalfHacker50
Imagine someone launching an attack on a corporate Windows network. Initially, the attacker has either limited or no privileges within the domain. Consequently, they will search for accounts and services without elevated privileges, meaning they won't be…
CONTINUE READING 🡒
Collecting Credentials in Active Directory: Identifying Critical Data Amid Domain Attacks
Security

Collecting Credentials in Active Directory: Identifying Critical Data Amid Domain…

2 months ago27/07/2025RalfHacker50
For a successful attack on Active Directory, taking control of workstations, and moving laterally across a network, a skilled hacker doesn't necessarily need user credentials. However, there are times when they are indispensable. To obtain these credentials,…
CONTINUE READING 🡒
Ultimate guide to Metasploit: how to use the renowned pentesting framework
Security

Ultimate guide to Metasploit: how to use the renowned pentesting…

01.06.202108/04/2025RalfHacker60
As you are likely aware, Metasploit is the most acclaimed exploitation and post-exploitation framework in the world. Even if you don’t use it, you had definitely encountered numerous references to Metasploit in our materials. In this article, I will give a brief overview of this framework,…
CONTINUE READING 🡒
Ultimate guide to PowerShell Empire: from installation to persistence in the target system
Security

Ultimate guide to PowerShell Empire: from installation to persistence in…

30.05.202108/04/2025RalfHacker231
Empire is a popular post-exploitation tool for Windows, Linux, and macOS. This article addresses all key aspects of this framework, including its most frequently used functions. Even if you are a seasoned pentester, you will likely find something new and useful in this material.
CONTINUE READING 🡒
Attacking Active Directory. An overview of actual privilege escalation techniques
Security

Attacking Active Directory. An overview of actual privilege escalation techniques

26.06.202008/04/2025RalfHacker70
Compromising a domain controller involves more than just finding a known vulnerability, stealing user credentials, or identifying an error in the security policy settings. The above 'achievements' grant only the minimum access level that may be insufficient…
CONTINUE READING 🡒
Lateral movement in Active Directory. Offensive techniques used to attack the domain
Security

Lateral movement in Active Directory. Offensive techniques used to attack…

26.06.202008/04/2025RalfHacker121
Imagine that you have successfully retrieved users' accounts in a network with an Active Directory domain controller and escalated your privileges. But what if you control not the entire network, but just a small segment of it?…
CONTINUE READING 🡒
  • No bullshit
  • Cookie Policy
  • Privacy Policy
HackMag — Top-notch cybersecurity magazine © 2025
Support:support@hackmag.com