We began by doing an nmap scan of the machine using the command: result=$(nmap -p- --min-rate=1000 -Pn -T4 10.129.229.114 | grep '^[0-9]' | cut -d '/' -f 1 | tr '\n' ',' | sed 's/,$//' | tr -d '%');nmap -p$result -Pn -sC -sV 10.129.229.114 -oA...
¿Qué es Kerberos? 🐶 Kerberos es un protocolo de autenticación que sirve para autenticar dos dispositivos que se conectan entre sí. No significa que vaya a autorizarlos, sino autenticarlos. Su función es identificar cada usuario mediante cifrado. Es...
Kerberoasting is a technique used by ethical hackers and security experts to evaluate network security. It exploits weak service account configurations to extract service tickets or credentials used by certain system services, enabling a form of priv...