You May Also Enjoy
IPv6 DNS Takeover with MITM6 in an Active Directory Environment
3 minute read
Table of Contents Introduction Understanding IPv6 DNS Takeover Mitigation Strategies Demonstration Steps Step 1: Setup NTLM Relay using L...
Understanding SMB Relay Attacks and Mitigation Techniques
4 minute read
Introduction
Understanding LLMNR Poisoning and Mitigation Techniques
4 minute read
Introduction In this blog post, I will be discussing a common network attack called Link-Local Multicast Name Resolution (LLMNR) poisoning. This type of atta...
My Journey to eJPT Certification: Insights and Tips for Success
5 minute read
Earning the INE Security Junior Penetration Tester (eJPT) certification has been a significant milestone in my cybersecurity journey. In this blog post, I’ll...