<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Internal Pentest on Raizen | Blog</title><link>https://rai2en.github.io/tags/internal-pentest/</link><description>Recent content in Internal Pentest on Raizen | Blog</description><generator>Hugo -- gohugo.io</generator><language>en</language><copyright>© 2026 Rai2en</copyright><lastBuildDate>Fri, 08 May 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://rai2en.github.io/tags/internal-pentest/index.xml" rel="self" type="application/rss+xml"/><item><title>Active Directory Internal Pentest Lab - From Recon to Domain Compromise</title><link>https://rai2en.github.io/posts/active-directory-internal-pentest-lab/</link><pubDate>Fri, 08 May 2026 00:00:00 +0000</pubDate><guid>https://rai2en.github.io/posts/active-directory-internal-pentest-lab/</guid><description>Projet personnel de pentest interne Active Directory: cartographie réseau, exploitation Linux, pivot, Kerberoasting, DCSync, Pass-the-Hash et recommandations défensives.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://rai2en.github.io/posts/active-directory-internal-pentest-lab/cover.png"/></item></channel></rss>