Open in app

Sign In

Write

Sign In

Akshay Jain
Akshay Jain

32 Followers

Home

About

Jun 19, 2020

Bloodhound and Active Directory fortifying mechanism

Numerous flow has been noted in identifying vulnerable attack paths on a system utilizing Active Directory with many different methods and techniques. During this assessment, we’ll analyze a couple of Tools and Techniques, which are remodelled strategy for Active Directory assessment. We’ll analyze various methodologies to Find and exploiting/patching…

Offensive Security

8 min read

Bloodhound and Active Directory fortifying mechanism
Bloodhound and Active Directory fortifying mechanism
Offensive Security

8 min read


Apr 1, 2020

DLL Hijacking Attack

Even though we routinely use computer application to play out our everyday Task, not many of us know or will, in general, consider the ramifications of how this software is built, and any shortcomings it may be vulnerable as it starts execution. But hackers and cyber-criminals use various tools and…

Security

8 min read

DLL Hijacking Attack
DLL Hijacking Attack
Security

8 min read


Feb 27, 2020

How to secure yourself from Malware misusing VSSAdmin.exe

vssadmin.exe is an internal process-related with Microsoft® Windows® Operating System from Microsoft Corporation. Vssadmin is a default Windows process that controls volume shadow duplicates of the documents on a given PC. These shadow copies are regularly utilized as a recovery point, and they can be utilized to reestablish or return…

4 min read

How to secure yourself from Malware misusing VSSAdmin.exe
How to secure yourself from Malware misusing VSSAdmin.exe

4 min read


Jan 23, 2020

Hacking 101: Introduction to YARA rules

You might have heard about YARA rules, it is an open-source tool for detecting and reversing hashes of arbitrary files and directories on an end system. And the thing about that is that the result of executing the rules via a regular command line is a perfectly nice file inclusion…

Yara

6 min read

Hacking 101: Introduction to YARA rules
Hacking 101: Introduction to YARA rules
Yara

6 min read


Nov 10, 2019

Jarvis — HackTheBox Writeup

Jarvis is a Norman French surname (last name) linked to Saint Gervasius. Its Latin meaning is “He who is skilled with a spear.” Jarvis was a basic and fun box. I’ll begin by finding an SQLi in one of the site pages and get a fundamental shell utilizing sqlmap and…

Hacking

5 min read

Jarvis — HackTheBox Writeup
Jarvis — HackTheBox Writeup
Hacking

5 min read


Sep 13, 2019

How a pdf can be abused to steal windows credentials

A PDF (Portable Document Format) is an electronic document introduced by Adobe. It is fundamentally used to distribute finishing up variant of reports on the Internet, by email or on other platforms. Its fundamental reason for existing is to show or print reports with a fixed design. …

Hacking

5 min read

How a pdf can be abused to steal windows credentials
How a pdf can be abused to steal windows credentials
Hacking

5 min read


Aug 4, 2019

How I bypass malware detection using Obfuscation

Every day thousands of malware are released online malware wants to stay hidden during infection and operation to prevent removal and analysis, this Malware achieves this using many techniques to bypass detection one of the method is obfuscation this method can be used to cover filename/signature, changing the malware attributes…

Hacking

4 min read

How I bypass malware detection using Obfuscation
How I bypass malware detection using Obfuscation
Hacking

4 min read

Akshay Jain

Akshay Jain

32 Followers

Mr Akuma | cyber security enthusiast |Secuirty Noob

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams