In this newest installment in the Cool Tools series, lead penetration tester Andrew Trexler shows[…]
Raxis’ Andrew Trexler shows how useful Nuclei is for network and application penetration tests, discovering[…]
Andrew Trexler is back with his SQLi Series, this time demonstrating SQL Timing Attacks using[…]
In this first in a new series, Raxis’ Andrew Trexler explains what SQL Injection (SQLi)[…]
Learn to exploit msDS-AllowedToActOnBehalfOfOtherIdentitity to gain administrative access in a Resource Based Constrained Delegation (RBCD)
Raxis’ Andrew Trexler ran into some issues with certipy when testing on port 443 and[…]
Raxis’ Andrew Trexler adds to his Active Directory series with a thorough tutorial of Active[…]
Andrew Trexler continues his AD Series with an in-depth tutorial on broadcast Attacks using NTLMRelayx,[…]
Andrew Trexler walks us through creating a simple AD test environment to test new hacks[…]
The Dirty Pipe vulnerability (CVE-2022-0847) allows any user to write to read-only files, including files[…]
What’s it like to earn your OSCP? Raxis senior penetration tester Andrew Trexler talks about[…]
Senior penetration tester Andrew Trexler has a penchant for breaking in and blowing up. Read[…]