<feed xmlns="http://www.w3.org/2005/Atom"> <id>https://karmanya03.github.io/</id><title>Karmanya's Sec Blog</title><subtitle>Penetration testing writeups, security research, and technical deep dives.</subtitle> <updated>2026-05-15T01:15:52+05:30</updated> <author> <name>Karmanya Ravindra</name> <uri>https://karmanya03.github.io/</uri> </author><link rel="self" type="application/atom+xml" href="https://karmanya03.github.io/feed.xml"/><link rel="alternate" type="text/html" hreflang="en" href="https://karmanya03.github.io/"/> <generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator> <rights> © 2026 Karmanya Ravindra </rights> <icon>/assets/img/favicons/favicon.ico</icon> <logo>/assets/img/favicons/favicon-96x96.png</logo> <entry><title>MartiniAD</title><link href="https://karmanya03.github.io/posts/MartiniAD-Writeup/" rel="alternate" type="text/html" title="MartiniAD" /><published>2026-05-14T22:05:00+05:30</published> <updated>2026-05-14T22:05:00+05:30</updated> <id>https://karmanya03.github.io/posts/MartiniAD-Writeup/</id> <content type="text/html" src="https://karmanya03.github.io/posts/MartiniAD-Writeup/" /> <author> <name>Karmanya Ravindra</name> </author> <category term="Writeups" /> <category term="Active Directory" /> <summary>Let’s talk about MartiniAD. I recently tackled this Active Directory box, and honestly, the attack path was a beautiful disaster of stacked misconfigurations. It started with credentials left out in the open, escalated through a classic Kerberoast, and ended because a Domain Admin basically left their password on a sticky note in the terminal history. Here is the full breakdown of how I grabbe...</summary> </entry> </feed>
