Mastering Kerberos: Capturing Active Directory on a HackTheBox Virtual Machine

Date: 22/07/2025

In this article, I will demonstrate how to go from zero to a fully-fledged Active Directory domain controller administrator, with the help of one of the virtual machines available for hacking on the CTF platform HackTheBox. While it may not be the most challenging machine, mastering AD skills is crucial if you’re planning to pentest corporate networks.
Read full article →


Introduction to Hacking: Authentication Testing and Basic Security Exploits

Date: 22/07/2025

Have you ever wondered how software crackers bypass password checks or remove license restrictions from applications? At the heart of this process lies a skill called reverse engineering — and one of its most accessible tools is the debugger. In this article, we’ll take a beginner-friendly look at how to analyze and modify a simple password-protected program using a debugger, revealing the logic behind its checks and even altering its behavior.
Read full article →


Mastering the Terminal: Essential Tips to Become a Console Guru

Date: 21/07/2025

Anyone familiar with Unix systems who has spent a couple of hours learning basic commands and bash syntax knows that the command line is an incredibly convenient tool. However, not everyone realizes just how powerful and efficient the console can truly be. In this article, we’ll explore several intriguing tricks that will enhance your command line skills to the point where you won’t want to return to a graphical interface.
Read full article →


Understanding and Hacking BitLocker: Exploring Windows Disk Encryption and Its Vulnerabilities

Date: 20/07/2025

BitLocker encryption technology was first introduced ten years ago and has evolved with each version of Windows. However, not all changes were aimed at enhancing its cryptographic strength. In this article, we will closely examine the structure of different BitLocker versions (including those pre-installed in the latest builds of Windows 10) and demonstrate how this built-in security mechanism can be bypassed.
Read full article →