• News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • Log In
  • Sign Up
  • No bullshit
  • Cookie Policy
  • Privacy Policy
Log In / Sign Up

Author: snovvcrash

Mastering Kerberos: Capturing Active Directory on a HackTheBox Virtual Machine
Security

Mastering Kerberos: Capturing Active Directory on a HackTheBox Virtual Machine

2 months ago22/07/2025snovvcrash130
In this article, I will demonstrate how to progress from a beginner to a fully functional Active Directory domain controller administrator. We'll use a virtual machine available for hacking on the HackTheBox CTF platform as our guide.…
CONTINUE READING šŸ”’
Dumping at nanolevel. How I reinvented SafetyKatz to dump LSASS with NanoDump
Malware

Dumping at nanolevel. How I reinvented SafetyKatz to dump LSASS…

13.06.202523/07/2025snovvcrash290
This article discusses theĀ covert use ofĀ the NanoDump utility from memory (i.e. theĀ simulated attacker doesn’t have aĀ C&C ā€˜beacon’ onĀ the attacked network node) andĀ compares such anĀ application ofĀ NanoDump with theĀ use ofĀ SafetyKatz.
CONTINUE READING šŸ”’
Serpent pyramid. Run malware from the EDR blind spots!
Security

Serpent pyramid. Run malware from the EDR blind spots!

04.04.202308/04/2025snovvcrash80
In this article, I’ll show how toĀ modify aĀ standalone Python interpreter so that you can load malicious dependencies directly into memory using theĀ Pyramid tool (not toĀ be confused with theĀ web framework ofĀ the same name). Potentially, this enables you toĀ evade…
CONTINUE READING šŸ”’
Poisonous spuds. Privilege escalation in AD with RemotePotato0
Security

Poisonous spuds. Privilege escalation in AD with RemotePotato0

26.03.202308/04/2025snovvcrash140
This article discusses different variations ofĀ the NTLM Relay cross-protocol attack delivered using theĀ RemotePotato0 exploit. InĀ addition, you will learn how toĀ hide theĀ signature ofĀ an executable file from static analysis.
CONTINUE READING šŸ”’
Challenge the Keemaker! How to bypass antiviruses and inject shellcode into KeePass memory
Coding Security

Challenge the Keemaker! How to bypass antiviruses and inject shellcode…

03.06.202217/04/2025snovvcrash160
Recently, I was involved with aĀ challenging pentesting project. Using theĀ KeeThief utility from GhostPack, I tried toĀ extract theĀ master password for theĀ open-source KeePass database from theĀ process memory. Too bad, EDR was monitoring theĀ system andĀ prevented me from doing this: after…
CONTINUE READING šŸ”’
Stratosphere flight. How to crack Struts using an Action app and create a Forward Shell
Security

Stratosphere flight. How to crack Struts using an Action app…

19.10.202017/04/2025snovvcrash60
Today, I will show how to conquer the stratosphere - i.e. gain root access on the Stratosphere VM available on [Hack The Box](https://www.hackthebox.eu/) CTF grounds. To capture the root flag, I will have to overcome the Apache…
CONTINUE READING šŸ”’
The PWN realm. Modern techniques for stack overflow exploitation
Security

The PWN realm. Modern techniques for stack overflow exploitation

19.10.202017/04/2025snovvcrash71
The buffer overflow vulnerability is an extremely popular topic on hackers' forums. In this article, I will provide a universal and practically-oriented 'introduction' for enthusiasts studying the basics of low-level exploitation. Using stack overflow as an example,…
CONTINUE READING šŸ”’
Compressed Token Format (CTF). One-time passwords, LDAP injections, and tricks with 7z archiver
Security

Compressed Token Format (CTF). One-time passwords, LDAP injections, and tricks…

19.10.202017/04/2025snovvcrash90
Today, I will explain how to hack the CTF virtual machine available on [Hack The Box](https://www.hackthebox.eu/) training grounds. For the purposes of this article, the abbreviation "CTF" refers to Compressed Token Format, not Capture the Flag. This…
CONTINUE READING šŸ”’
Diabolically reddish pentest. Building tunneling chains through docker containers on a Hack the Box virtual machine
Security

Diabolically reddish pentest. Building tunneling chains through docker containers on…

04.08.202008/04/2025snovvcrash60
How to seize control over a host located in a different subnetwork? The right answer is: build numerous intricate tunnels. This article addresses tunneling techniques and their application in pentesting using as an example Reddish, a hardcore…
CONTINUE READING šŸ”’
The great mischief. Working your way to the root flag through IPv6 labyrinths on a Hack the Box virtual machine
Security

The great mischief. Working your way to the root flag…

04.05.2020snovvcrash120
In this article, I will explain how to gain superuser privileges on Mischief VM available on [Hack The Box](https://www.hackthebox.eu/) training grounds. During this journey, you will acquire some SNMP skills, understand the IPv6 routing principles, and learn…
CONTINUE READING šŸ”’
Where to study pentesting? An overview of training grounds for ethical hackers
Security

Where to study pentesting? An overview of training grounds for…

15.03.202015/03/2020snovvcrash91
Today, I will give a brief overview of some of the best pentesting portals recognized by security experts. These training grounds enable ethical hackers to polish their skills while preserving 'ethicality' and exploit newly-discovered vulnerabilities while staying…
CONTINUE READING šŸ”’
Epic pivoting. Polishing traffic routing skills on HackTheBox virtual machines
Security

Epic pivoting. Polishing traffic routing skills on HackTheBox virtual machines

15.03.2020snovvcrash70
A good knowledge of pivoting (a technique used to route traffic to the victim and back through interim hosts) is essential for any ethical hacker. Furthermore, this skill is absolutely mandatory for corporate network pentesting. In this…
CONTINUE READING šŸ”’
The taming of Kerberos. Seizing control over Active Directory on a HackTheBox virtual PC
Security

The taming of Kerberos. Seizing control over Active Directory on…

28.02.202017/04/2025snovvcrash70
In this article, I am going to show how to escalate from an unprivileged user to the administrator of the Active Directory domain controller. The demonstration will be performed on a virtual PC available for hacking on…
CONTINUE READING šŸ”’
  • No bullshit
  • Cookie Policy
  • Privacy Policy
HackMag — Top-notch cybersecurity magazine Ā© 2025
Support:support@hackmag.com