w0rk3r's Windows Hacking Library – Telegram
w0rk3r's Windows Hacking Library
1.55K subscribers
10 photos
577 links
Manual job, I'm not a bot ;)

@BlueTeamLibrary
@W0rk3r
Download Telegram
Exchange-AD-Privesc. Repository of Exchange privilege escalations to Active Directory

This repository provides a few techniques and noscripts regarding the impact of Microsoft Exchange deployment on Active Directory security.

https://github.com/gdedrouas/Exchange-AD-Privesc
Unofficial Guide to Mimikatz & Command Reference

https://adsecurity.org/?page_id=1821
Gathering AD Data with the Active Directory PowerShell Module

https://adsecurity.org/?p=3719
Forwarded from Security Talks (Jonhnathan Jonhnathan Jonhnathan)
Not a Security Boundary: Bypassing User Account Control
Matt Nelson at Derbycon 2017

Microsoft's User Account Control feature, introduced in Windows Vista, has been a topic of interest to many in the security community. Since UAC was designed to force user approval for administrative actions, attackers (and red teamers) encounter UAC on nearly every engagement. As a result, bypassing this control is a task that an actor often has to overcome, despite its lack of formal designation as a security boundary. This talk highlights what UAC is, previous work by others, research methodology, and details several technical UAC bypasses developed by the author.

https://youtu.be/c8LgqtATAnE

@SecTalks