Network Security Channel
2.72K subscribers
5.34K photos
3.42K videos
5.58K files
4.44K links
⭕️Start Channel From 2017⭕️
Security Operation Center (SOC)
Bug Bounty
Vulnerability
Pentest
Hardening
Linux
Reasearch
Security Network
Security Researcher
DevSecOps
Blue Team
Red Team
Download Telegram
Network Security Channel
Bug Bounty Course.pdf
Bug Bounty Training Program (Online)

Hurry up, get enrolled yourself with IGNITE TECHNOLOGIES’ fully exclusive Training Program “Bug Bounty.”

✔️ Table of Content
🚀 Introduction to WAPT & OWASP Top 10
🛠 Pentest Lab Setup
🔍 Information Gathering & Reconnaissance
💻 Netcat for Pentester
⚙️ Configuration Management Testing
🔐 Cryptography
🔑 Authentication
🕒 Session Management
📂 Local File Inclusion
🌐 Remote File Inclusion
📁 Path Traversal
💣 OS Command Injection
🔀 Open Redirect
📤 Unrestricted File Upload
🐚 PHP Web Shells
📝 HTML Injection
🌟 Cross-Site Scripting (XSS)
🔄 Client-Side Request Forgery
🛑 SQL Injection
📜 XXE Injection
🎁 Bonus Section

#infosec #cybersecurity #cybersecuritytips #microsoft #redteam #informationsecurity #CyberSec #microsoft #offensivesecurity #infosecurity #cyberattacks #security #oscp #cybersecurityawareness #bugbounty #bugbountytips

🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
1
Network Security Channel
1777790686123.pdf
🔍 Active Directory Enumeration Walkthrough: Mapping a Domain with pywerview
Just published a hands-on lab write-up demonstrating how an authenticated attacker with low-privileged credentials can enumerate a full Active Directory environment using pywerview — the Python port of the legendary PowerView module — and uncover real privilege escalation paths from a single foothold.
🔹 Lab Scenario:
Starting credentials: raj / Password@1 against the ignite.local domain. From this minimal access, mapping out users, groups, computers, delegation settings, ACLs, GPOs, and trust relationships — entirely over LDAP.
🔹 Key Findings Uncovered Through Enumeration:
Domain Admin discovery — identified the aaru account via --admin-count filter (adminCount=1, member of Domain Admins)
Kerberoastable SPN — the kavish account exposed via --spn, configured with TRUSTED_TO_AUTH_FOR_DELEGATION against a SQL server (constrained delegation w/ protocol transition)
Unconstrained Delegation hosts — flagged via --unconstrained (a classic path to DC compromise)
Backup Operators abuse path — user shivam enumerated as a member, opening NTDS.dit dump potential
Trust enumeration — bidirectional forest trust to pentest.local discovered via get-netdomaintrust
Domain policy extraction — password length, complexity, lockout thresholds, and Kerberos ticket lifetimes all readable from SYSVOL
🔹 pywerview Modules Demonstrated:
get-netdomain, get-netuser, get-netgroup, get-netgroupmember, get-netcomputer, get-netshare, get-netsession, get-netloggedon, get-netou, get-netsite, get-netsubnet, get-netgpo, get-domainpolicy, invoke-userhunter, invoke-processhunter, invoke-checklocaladminaccess, get-objectacl, get-netdomaintrust
🔹 Why This Matters for Defenders:
Every red-team finding above is a blue-team checklist item. Misconfigured delegation, stale adminCount=1 flags, over-privileged Backup Operators, and SPN sprawl on user accounts are the silent killers of AD environments. You can't harden what you can't see.
🔹 Key Lesson From the Lab:
A single low-privileged user is enough to map your entire domain, identify Tier 0 assets, and build a full attack graph — without ever touching a tool that triggers EDR. LDAP queries are noisy only if you're watching for them.

💼 Currently exploring new opportunities in Network & Cybersecurity Engineering — open to on-site, hybrid, or remote roles. I deliver hands-on services in network design, firewall deployment (Fortinet, Cisco), Active Directory hardening, ICS/OT security (IEC 62443, NIST), penetration testing, and infrastructure hardening.

#CyberSecurity #ActiveDirectory #RedTeam #PenetrationTesting #pywerview #PowerView #ADSecurity #LDAP #Kerberoasting #PrivilegeEscalation #InfoSec #BlueTeam #OpenToWork #NetworkSecurity #OffensiveSecurity

🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer