<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Capture the Flag on Musings of a Pentester</title><link>https://blog.tobyjackson.io/categories/capture-the-flag/</link><description>Recent content in Capture the Flag on Musings of a Pentester</description><generator>Hugo -- 0.154.2</generator><language>en-gb</language><lastBuildDate>Fri, 24 Mar 2023 18:37:30 +0000</lastBuildDate><atom:link href="https://blog.tobyjackson.io/categories/capture-the-flag/index.xml" rel="self" type="application/rss+xml"/><item><title>Exploiting Active Directory Certificate Services - ESC11 Walkthrough</title><link>https://blog.tobyjackson.io/blog/exploiting-active-directory-certificate-services-esc11-walkthrough/</link><pubDate>Fri, 24 Mar 2023 18:37:30 +0000</pubDate><guid>https://blog.tobyjackson.io/blog/exploiting-active-directory-certificate-services-esc11-walkthrough/</guid><description>An overview and lab exploitation example of the ESC11 vulnerability, present in Active Directory Certificate Services when request encryption is disabled.</description></item><item><title>10 Things I Learnt in My First Year as a Penetration Tester</title><link>https://blog.tobyjackson.io/blog/10-things-i-learnt-in-my-first-year-as-a-penetration-tester/</link><pubDate>Sat, 31 Dec 2022 22:31:26 +0000</pubDate><guid>https://blog.tobyjackson.io/blog/10-things-i-learnt-in-my-first-year-as-a-penetration-tester/</guid><description>A reflective look back on what my first year as penetration tester/cyber security consultant taught me, and how those lessons can potentially help you.</description></item><item><title>Hack the Box Walkthroughs: Hathor</title><link>https://blog.tobyjackson.io/blog/hack-the-box-walkthroughs-hathor/</link><pubDate>Sat, 19 Nov 2022 18:06:04 +0000</pubDate><guid>https://blog.tobyjackson.io/blog/hack-the-box-walkthroughs-hathor/</guid><description>Hathor from Hack the Box was an Insane Windows machine that involves exploiting a misconfigured file upload, then identifying credentials in log files, before performing some DLL hijacking and finally, abusing an account with replication rights to obtain the administrator&amp;rsquo;s password hash.</description></item><item><title>Automating the Creation of TCM Security's PEH Home Active Directory Labs - It's Terra-fying</title><link>https://blog.tobyjackson.io/blog/automating-the-creation-of-vulnerable-active-directory-labs-with-terraform-how-terra-fying/</link><pubDate>Wed, 11 May 2022 21:40:03 +0000</pubDate><guid>https://blog.tobyjackson.io/blog/automating-the-creation-of-vulnerable-active-directory-labs-with-terraform-how-terra-fying/</guid><description>A guide on how to terraform the Active Directory Home Lab from the Practical Ethical Hacking course by TCM Security - and coincidentally - My first attempt at Infrastructure-as-Code and DevOps!</description></item><item><title>Hack the Box Walkthroughs: Anubis - Using SliverC2</title><link>https://blog.tobyjackson.io/blog/hack-the-box-walkthrough-anubis-using-sliverc2/</link><pubDate>Fri, 06 May 2022 19:20:46 +0000</pubDate><guid>https://blog.tobyjackson.io/blog/hack-the-box-walkthrough-anubis-using-sliverc2/</guid><description>In an attempt to broaden my skill set, I&amp;rsquo;ll be using the SliverC2 to complete Hack the Box machines and learn more about this fantastic Command and Control framework. This time around it&amp;rsquo;s the retired box: Anubis!</description></item></channel></rss>