Home Pentest Lab — AD Attack Chain
Full Active Directory kill chain in VMware: LLMNR poisoning → Pass-the-Hash → Kerberoasting → Domain Admin. Full documentation with mitigations filed post-operation.
root@kali:~# cat /etc/operative
Operative specialising in offensive security & infrastructure penetration. Currently embedded at Sampath Bank as Security Intern — threat modelling, vulnerability assessment & incident response. Active on CTF circuits under handle ULTRA.
Operative with expertise in offensive security and vulnerability research. Real identity known to ███████ ████████ only. Currently embedded within Sampath Bank's Security Division, conducting threat assessments on critical financial infrastructure.
Known to operate across CTF platforms under handle ULTRA. Specialises in network infiltration, web application exploitation, and social engineering simulations. Last confirmed location: ████████████.
$ SELECT * FROM operatives WHERE handle='ULTRA';
handle => ULTRA
role => Security Intern @ Sampath Bank
mission => Ethical Hacking & Penetration Testing
platforms => TryHackMe | HackTheBox | CTFtime
os => Kali Linux (primary) / Parrot OS
pgp_key => ████████████████████████
Full Active Directory kill chain in VMware: LLMNR poisoning → Pass-the-Hash → Kerberoasting → Domain Admin. Full documentation with mitigations filed post-operation.
Custom Python tool automating detection of SQLi, XSS, and IDOR. Modular plugin architecture. Deployed against authorised test targets.
10+ documented CTF solutions — reverse engineering, forensics, crypto, and web exploitation. Declassified and published for community knowledge.
Controlled phishing operation via GoPhish. Objective: measure human vulnerability in target org. Full post-op report with security hardening recommendations delivered.
Operative ULTRA accepts contact for vetted security engagements, collaboration, and authorised research. Unknown parties will be verified before any sensitive exchange.