Akshay JainBloodhound and Active Directory fortifying mechanismNumerous flow has been noted in identifying vulnerable attack paths on a system utilizing Active Directory with many different methods and…8 min read·Jun 19, 2020----
Akshay JainDLL Hijacking AttackEven though we routinely use computer application to play out our everyday Task, not many of us know or will, in general, consider the…8 min read·Apr 1, 2020----
Akshay JainHow to secure yourself from Malware misusing VSSAdmin.exevssadmin.exe is an internal process-related with Microsoft® Windows® Operating System from Microsoft Corporation.4 min read·Feb 27, 2020--1--1
Akshay JainHacking 101: Introduction to YARA rulesYou might have heard about YARA rules, it is an open-source tool for detecting and reversing hashes of arbitrary files and directories on…6 min read·Jan 23, 2020----
Akshay JainJarvis — HackTheBox WriteupJarvis is a Norman French surname (last name) linked to Saint Gervasius. Its Latin meaning is “He who is skilled with a spear.”5 min read·Nov 10, 2019--1--1
Akshay JainHow a pdf can be abused to steal windows credentialsA PDF (Portable Document Format) is an electronic document planned by Adobe. It is fundamentally used to distribute finishing up variant…5 min read·Sep 13, 2019----
Akshay JainHow I bypass malware detection using ObfuscationEvery day thousands of malware are released online malware wants to stay hidden during infection and operation to prevent removal and…4 min read·Aug 4, 2019--2--2