Here’s something encrypted, password is required to continue reading.
Gophish - Setting up without Evilginx - Part 2
GoPhish End-to-End Setup for Credential CaptureIn this second part, I will be configuring GoPhish from start to end, up to the point where we successfully capture the credentials of a phished user....Gophish - Setting up without Evilginx - Part 1
Gophish Infrastructure Setup (EC2 · DNS · SMTP)This section covers the infrastructure-level setup required before deploying GoPhish. Proper configuration at this stage is critical to avoid blacklis...Certified - Hack The Box
We began with the low-privileged user JUDITH.MADER@CERTIFIED.HTB, who had the ability to modify the owner of MANAGEMENT@CERTIFIED.HTB. By changing ownership, we added a controlled user to this grou...Escape Two - HackTheBox
Using rose‘s SMB credentials on DC01, we accessed and extracted credentials from accounts.xlsx, including the MSSQL sa account. With mssqlclient.py, we enabled xp_cmdshell and obtained a shell as s...Baby - Vulnlab - Windows - Easy
Baby is an Easy windows machine from Vulnlab, in which we start with ldapsearch and get a users password from a description and after resetting that users password we will be able to login to winrm...Vintage - Hack The Box
Here’s something encrypted, password is required to continue reading.
Real World Pentest Story
Here’s something encrypted, password is required to continue reading.








