Kerberoasting From Zero: A Deep Dive into SPN Exploitation
Understanding how Kerberos ticket-granting works and how attackers abuse service accounts to crack offline hashes.
> ethical hacker & security enthusiast
I break things to understand how they work. Then I write about it. This is my corner of the internet where I document my journey through penetration testing, CTF challenges, red teaming, and more.
I'm r0gg, a cybersecurity enthusiast on a mission to understand offensive and defensive security from the ground up. I spend my time hacking on CTF boxes, building labs, and diving deep into real-world attack techniques.
This portfolio is where I document everything, from Personal projects and red team operations to research on Active Directory, malware, and network exploitation.
I believe in learning by doing, writing things down, and sharing knowledge with the community. If it's on here, I've broken it, understood it, and lived to tell the tale.
View My WorkUnderstanding how Kerberos ticket-granting works and how attackers abuse service accounts to crack offline hashes.
Step-by-step walkthrough of exploiting a realistic AD environment: enumeration, privilege escalation, and domain compromise.
Dissecting a basic keylogger binary using Ghidra and x64dbg. A beginner-friendly intro to malware analysis.
/// More posts coming soon. Projects in progress. Stay tuned.