• Skip to primary navigation
  • Skip to content
  • Skip to footer
Notes by Nisha Notes by Nisha
  • Posts
  • Categories
  • Tags
  • Portfolio
  • Certificates
  • Resources

    Understanding SMB Relay Attacks and Mitigation Techniques

    Secure Your Network: Uncovering SMB Relay Attacks and Effective Mitigation Strategies.

    less than 1 minute read

    Photo credit: AI
    Nisha P McDonnell

    Nisha P McDonnell

    Cybersecurity Engineer

    • GitHub
    • LinkedIn
    • YouTube

    Table of Contents

    Tags: Active Directory, Cybersecurity, Ethical Hacking, Offensive, Penetration Testing, Red Team, SMB

    Categories: Blog

    Updated: July 22, 2024

    Share on

    X Facebook LinkedIn Bluesky
    Next Previous

    You May Also Enjoy

    Exploiting AlwaysInstallElevated for Windows Privilege Escalation

    1 minute read

    A walkthrough of exploiting the AlwaysInstallElevated misconfiguration on Windows to escalate from user to SYSTEM using a malicious MSI payload.

    Devel Rooted: A Hack The Box Walkthrough

    1 minute read

    This post is a walkthrough of the ‘Devel’ retired machine from Hack The Box. I gain initial access through an exposed FTP and WebDAV setup, then escalate pri...

    LazyAdmin TryHackMe Walkthrough

    3 minute read

    A complete walkthrough of the LazyAdmin room on TryHackMe, demonstrating enumeration, exploitation, and privilege escalation.

    Anonymous Rooted: A TryHackMe Walkthrough

    4 minute read

    This walkthrough covers the TryHackMe ‘Anonymous’ room. I gain user-level access via FTP and a writable script, capture the user flag, and escalate to root v...

    • GitHub
    • LinkedIn
    • YouTube
    • Feed
    © 2025 Notes by Nisha. Powered by Jekyll & Minimal Mistakes.