<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Red-Team on it-learn.io | IT, Networking &amp; Cybersecurity Blog</title><link>https://blog.it-learn.io/tags/red-team/</link><description>Recent content in Red-Team on it-learn.io | IT, Networking &amp; Cybersecurity Blog</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Wed, 15 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://blog.it-learn.io/tags/red-team/index.xml" rel="self" type="application/rss+xml"/><item><title>Pass-the-Hash: Why Stealing the Hash Is Just as Good as the Password</title><link>https://blog.it-learn.io/posts/2026-04-15-pass-the-hash-why-the-hash-is-as-good-as-the-password/</link><pubDate>Wed, 15 Apr 2026 00:00:00 +0000</pubDate><guid>https://blog.it-learn.io/posts/2026-04-15-pass-the-hash-why-the-hash-is-as-good-as-the-password/</guid><description>&lt;p&gt;Pass-the-Hash (PtH) is arguably the most impactful lateral movement technique in Windows environments. It transforms credential access into network-wide compromise without requiring password cracking, works across the majority of enterprise network services, and has been a core component of some of the most destructive cyberattacks in history — including NotPetya and numerous ransomware operations. Understanding its mechanics is prerequisite to understanding why so many Active Directory environments remain vulnerable despite years of awareness.&lt;/p&gt;</description></item><item><title>Kerberoasting: Stealing Service Tickets to Crack Passwords Offline</title><link>https://blog.it-learn.io/posts/2026-04-14-kerberoasting-stealing-service-tickets-to-crack-passwords/</link><pubDate>Tue, 14 Apr 2026 00:00:00 +0000</pubDate><guid>https://blog.it-learn.io/posts/2026-04-14-kerberoasting-stealing-service-tickets-to-crack-passwords/</guid><description>&lt;p&gt;Kerberoasting is one of the most reliably effective Active Directory attack techniques: it requires only a valid domain account, leaves minimal traces by default, and yields plaintext service account credentials that often grant significant lateral movement opportunities. Unlike many AD attacks that require elevated access or interaction with specific hosts, Kerberoasting operates entirely through legitimate Kerberos protocol requests — making it difficult to block without fundamentally changing service account management practices.&lt;/p&gt;</description></item></channel></rss>