Shinning Star

Let your star shine …

  • LinkedIn
  • facebook
  • Twitter
  • github
  • Home
  • About Me
  • Success-story
    • My OSCP Journey
    • My OSWE journey
    • My OSEP journey
    • My OSDA Journey
    • My CISSP Journey
  • Cyber security
    • Pentest
    • Bug hunting
    • Open source
  • Contact

Category - tutorial

  • opensource
  • pentest
  • tutorial

Introducing ADShareEnum — Dockerized Active Directory Share Enumeration

April 28, 2025
by AdminStar@
2 min read
Add Comment

During internal assessments or red team engagements, identifying misconfigured shares in an Active Directory environment is a key step for privilege escalation and lateral movement. That’s why I built ADShareEnum, a Dockerized...

Continue reading

  • opensource
  • pentest
  • tutorial

LDAP Enumeration with ldapsearch

October 23, 2024
by AdminStar@
4 min read
Add Comment

Recently, I was working on an Active Directory lab where the challenge was to extract a password stored in a user’s description field. I successfully completed the task using CrackMapExec on my primary computer. However...

Continue reading

  • opensource
  • tutorial

Wireshark filters for analyst

April 6, 2023
by AdminStar@
11 min read
Add Comment

1. Filter by IP address: “ip.addr == x.x.x.x”, where “x.x.x.x” is the IP address you want to filter 2. Filter by IP address range: “ip.addr >= x.x.x.x and ip.addr <= y.y.y.y”, where...

Continue reading

  • pentest
  • tutorial

Active directory account takeover with shadow credential : AddKeyCredentialLink abuse

November 4, 2022
by AdminStar@
10 min read
Add Comment

In this post I would like to talk about shadow credential attack that can be exploited by abusing AddKeyCredentialLink privilege in an Active Directory Infrastructure. 1-What is shadow credential ? It is a technique allowing an...

Continue reading

  • pentest
  • tutorial

WSUS privilege escalation

November 4, 2022
by AdminStar@
10 min read
Add Comment

Recently, I’ve discovered a new way to escalate privilege on windows through WSUS when HTTP protocol is used instead of HTTPS. In this quick explanation I’ll describe what WSUS is, explain how to detect the vulnerability and...

Continue reading

Copyright © 2025. Created by Meks. Powered by WordPress.
  • Home
  • About Me
  • Success-story
    • My OSCP Journey
    • My OSWE journey
    • My OSEP journey
    • My OSDA Journey
    • My CISSP Journey
  • Cyber security
    • Pentest
    • Bug hunting
    • Open source
  • Contact
  • LinkedIn
  • facebook
  • Twitter
  • github