Mastering systemd: Creating Your Own Linux Service

Date: 29/07/2025

Despite numerous challenges and mixed feelings from users, systemd has already become the de facto standard in most Linux distributions. With it, you can create a simple service in just a few minutes and with about ten lines of configuration. However, many of its more intriguing features are poorly documented or require an in-depth understanding of systemd’s intricacies.
Read full article →


Gathering User Data in Windows Networks: Exploring Active Directory Without Privileges

Date: 28/07/2025

Imagine someone launching an attack on a corporate Windows network. Initially, the attacker either has limited privileges in the domain or none at all. Therefore, they will search for accounts and services without elevated privileges, meaning not as a domain or local administrator. We will discuss how reconnaissance is conducted in an Active Directory environment.
Read full article →


Collecting Credentials in Active Directory: Identifying Critical Data Amid Domain Attacks

Date: 27/07/2025

To successfully attack Active Directory, compromise workstations, and move through a network, a skilled hacker doesn’t necessarily need user credentials. However, sometimes they are indispensable. To obtain these credentials, it’s important to know where passwords are typically stored in networks using Active Directory and how to extract them.
Read full article →