Skip to content
HiveSecurity
  • Home
  • Blog
  • Tags
  • Vulnerabilities
  • Cheat Sheet
  • Tools
  • Contact
  • About
Esc
Type to search...
  • Home
  • Blog
  • Tags
  • Vulnerabilities
  • Cheat Sheet
  • Tools
  • Contact
  • About
← All tags Tag

Penetration Testing

15 articles

Linux Lateral Movement: Attack Techniques and How to Detect Them

A complete guide to Linux lateral movement — SSH pivoting, ssh-agent hijacking, credential harvesting, port forwarding, and NFS abuse. Includes auditd rules, Sigma, Wazuh, and Sentinel KQL detections.

29 April 2026
Linux Red Team Blue Team

Linux Privilege Escalation: Attack Techniques and How to Detect Them

A complete guide to Linux privilege escalation — SUID abuse, sudo misconfig, cron hijacking, capabilities, and kernel exploits. Includes auditd rules, Sigma, Wazuh, and Sentinel KQL detections.

24 April 2026
Linux Red Team Blue Team

NTLM Relay in 2026: Microsoft Declared It Dead. Attackers Didn't Get the Memo.

Microsoft is officially deprecating NTLM — yet CVE-2025-24054 was actively exploited days after patching, and the Coercion → Relay → ADCS → Domain Admin chain still works in most enterprise environments. Here's the full 2026 kill chain and how to detect it.

21 April 2026
Active Directory Red Team Blue Team

SQL Injection in 2026: The Complete Attack and Defense Guide

SQL injection has existed since 1998 and still powers major breaches in 2026. A complete guide covering every attack type, real exploitation techniques, detection logic, and how to actually fix it.

13 April 2026
Web Security Red Team Blue Team

CSRF Explained: How Attackers Trick Your Browser Into Making Requests for Them

CSRF (Cross-Site Request Forgery) forces authenticated users to unknowingly submit requests to a site they're logged into. Learn how it works, how to find it, and how to fix it.

12 April 2026
Web Security Red Team OWASP

IDOR Explained: How Attackers Access Anyone's Data by Changing a Number

IDOR (Insecure Direct Object Reference) is one of the most common and most impactful web vulnerabilities. Learn how it works, how to find it, and how to fix it.

12 April 2026
Web Security Red Team OWASP

Mobile Pentesting: How to Attack Android and iOS Apps Like a Professional

A practical guide to mobile application penetration testing on Android and iOS — static analysis, dynamic analysis, traffic interception, and the most common vulnerabilities found in real engagements.

12 April 2026
Mobile Security Red Team Penetration Testing

Network Penetration Testing: From Nmap Scan to Pivoting Deep Into the Network

A practical guide to network penetration testing — host discovery, service enumeration, vulnerability exploitation, credential attacks, and pivoting through segmented networks.

12 April 2026
Network Security Red Team Penetration Testing

Active Directory Attacks: The Complete Attack Path Guide

A structured guide to Active Directory attack techniques — from BloodHound enumeration through Kerberoasting, LSASS dumping, ADCS abuse, and Shadow Credentials to Entra ID pivot. Every technique with detection coverage.

8 April 2026
Active Directory Red Team Blue Team

API Security in 2026: JWT Attacks, OAuth Abuse, and GraphQL Exploitation

APIs are the most exploited attack surface in 2026. Learn how attackers abuse JWT tokens, OAuth flows, and GraphQL endpoints — and how to stop them.

8 April 2026
Web Security Red Team Blue Team

OSINT and Recon Methodology: A Practical Guide for Security Professionals

How to systematically map an organization's attack surface using open-source intelligence — domains, infrastructure, employees, leaked credentials, and exposed secrets.

8 April 2026
Red Team Penetration Testing Threat Intelligence

72 Hours to Domain Admin: A Red Team Engagement Debrief

A step-by-step debrief of a real-world red team engagement — from passive OSINT through AiTM phishing, EDR evasion, and ADCS exploitation to full domain compromise. What worked, what didn't, and what would have stopped us.

8 April 2026
Red Team Active Directory Penetration Testing

BloodHound from First Run to Domain Admin: A Practical Red Team Guide

A hands-on red team guide to BloodHound CE — from SharpHound data collection to reading attack paths and finding the fastest route to Domain Admin in Active Directory.

27 March 2026
Active Directory Red Team Penetration Testing

ADCS Abuse with Certipy: From Low-Priv User to Domain Admin via Certificate Services

Active Directory Certificate Services is installed in most enterprise networks — and almost always misconfigured. Here's how attackers exploit ESC1 through ESC8 with Certipy, and how to detect and stop them.

21 March 2026
Active Directory Red Team Blue Team

Web Application Penetration Testing 2026: Beyond OWASP Top 10

Advanced web application security testing techniques covering modern frameworks, API exploitation, authentication bypass, and real-world attack scenarios for 2026

20 December 2025
Red Team Web Security Cybersecurity
HiveSecurity

Offensive thinking. Defensive expertise.

  • Home
  • Blog
  • Tags
  • Vulnerabilities
  • Tools
  • Cheat Sheet
  • Contact
  • About
  • RSS
  • Privacy

© 2026 Hive Security. All rights reserved.

Built with zero trust & least privilege