From Workstation to Domain Admin: Why Secure Administration isn’t Secure and How to Fix it
https://adsecurity.org/wp-content/uploads/2018/08/us-18-Metcalf-From-Workstation-To-Domain-Admin-Why-Secure-Administration-Isnt-Secure-Final.pdf
@WindowsHackingLibrary
https://adsecurity.org/wp-content/uploads/2018/08/us-18-Metcalf-From-Workstation-To-Domain-Admin-Why-Secure-Administration-Isnt-Secure-Final.pdf
@WindowsHackingLibrary
Tools for instrumenting Windows Defender's mpengine.dll
https://github.com/0xAlexei/WindowsDefenderTools
@WindowsHackingLibrary
https://github.com/0xAlexei/WindowsDefenderTools
@WindowsHackingLibrary
GitHub
GitHub - 0xAlexei/WindowsDefenderTools: Tools for instrumenting Windows Defender's mpengine.dll
Tools for instrumenting Windows Defender's mpengine.dll - 0xAlexei/WindowsDefenderTools
Art of Anti Detection 1 – Introduction to AV & Detection Techniques
https://pentest.blog/art-of-anti-detection-1-introduction-to-av-detection-techniques
@WindowsHackingLibrary
https://pentest.blog/art-of-anti-detection-1-introduction-to-av-detection-techniques
@WindowsHackingLibrary
Ridrelay: Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.
https://github.com/skorov/ridrelay
@WindowsHackingLibrary
https://github.com/skorov/ridrelay
@WindowsHackingLibrary
GitHub
GitHub - skorov/ridrelay: Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.
Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv. - skorov/ridrelay
Remotely Enumerate Anti-Virus Configurations
https://www.fortynorthsecurity.com/remotely-enumerate-anti-virus-configurations
@WindowsHackingLibrary
https://www.fortynorthsecurity.com/remotely-enumerate-anti-virus-configurations
@WindowsHackingLibrary
FortyNorth Security Blog
Remotely Enumerate Anti-Virus Configurations
There are a variety of reasons why a pen tester would want to obtain the anti-virus configurations of the system they are targeting. The ability to capture this information remotely can allow a pen tester to customize their actions for the computer they are…
Juicy Potato (abusing the golden privileges)
https://decoder.cloud/2018/08/10/juicy-potato
@WindowsHackingLibrary
https://decoder.cloud/2018/08/10/juicy-potato
@WindowsHackingLibrary
Decoder's Blog
Juicy Potato (abusing the golden privileges)
Today me and my partner in crime Giuseppe, are releasing our small research with Windows impersonate privileges. The result is a tool named “Juicy Potato”, which is a kind of sequel of …
w0rk3r's Windows Hacking Library
Juicy Potato (abusing the golden privileges) https://decoder.cloud/2018/08/10/juicy-potato @WindowsHackingLibrary
Juicy Potato (abusing the golden privileges)
https://ohpe.github.io/juicy-potato
@WindowsHackingLibrary
https://ohpe.github.io/juicy-potato
@WindowsHackingLibrary
juicy-potato
Juicy Potato (abusing the golden privileges)
A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts to NT AUTHORITY\SYSTEM.
Koadic C3 COM Command & Control - JScript RAT
https://github.com/zerosum0x0/koadic
@WindowsHackingLibrary
https://github.com/zerosum0x0/koadic
@WindowsHackingLibrary
Phishing – Ask and ye shall receive
https://blog.fox-it.com/2018/08/14/phishing-ask-and-ye-shall-receive
@WindowsHackingLibrary
https://blog.fox-it.com/2018/08/14/phishing-ask-and-ye-shall-receive
@WindowsHackingLibrary
Fox-IT International blog
Phishing – Ask and ye shall receive
During penetration tests, our primary goal is to identify the difference in paths that can be used to obtain the goal(s) as agreed upon with our customers. This often succeeds due to insufficient h…
Windows Exploitation Tricks: Exploiting Arbitrary Object Directory Creation for Local Elevation of Privilege
https://googleprojectzero.blogspot.com/2018/08/windows-exploitation-tricks-exploiting.html
@WindowsHackingLibrary
https://googleprojectzero.blogspot.com/2018/08/windows-exploitation-tricks-exploiting.html
@WindowsHackingLibrary
Blogspot
Windows Exploitation Tricks: Exploiting Arbitrary Object Directory Creation for Local Elevation of Privilege
Posted by James Forshaw, Project Zero And we’re back again for another blog in my series on Windows Exploitation tricks. This time I’ll...
Bypass in Microsoft AD FS Multi-Factor Authentication protocol (CVE-2018-8340):
Multi-Factor Mixup: Who Were You Again?
https://www.okta.com/security-blog/2018/08/multi-factor-authentication-microsoft-adfs-vulnerability
@WindowsHackingLibrary
Multi-Factor Mixup: Who Were You Again?
https://www.okta.com/security-blog/2018/08/multi-factor-authentication-microsoft-adfs-vulnerability
@WindowsHackingLibrary
Okta Security
Multi-Factor Mixup: Who Were You Again?
Summary:
A weakness in the Microsoft ADFS protocol for integration with MFA products allows a second factor for one account to be used for second-factor authentication to all other accounts in an organization.
After being notified about the vulnerability…
A weakness in the Microsoft ADFS protocol for integration with MFA products allows a second factor for one account to be used for second-factor authentication to all other accounts in an organization.
After being notified about the vulnerability…
Reconerator: C# Targeted Attack Reconnissance Tools
https://github.com/stufus/reconerator
@WindowsHackingLibrary
https://github.com/stufus/reconerator
@WindowsHackingLibrary
GitHub
GitHub - stufus/reconerator: C# Targeted Attack Reconnissance Tools
C# Targeted Attack Reconnissance Tools. Contribute to stufus/reconerator development by creating an account on GitHub.
DCShadow - Minimal permissions, Active Directory Deception, Shadowception and more
http://www.labofapenetrationtester.com/2018/04/dcshadow.html
@WindowsHackingLibrary
http://www.labofapenetrationtester.com/2018/04/dcshadow.html
@WindowsHackingLibrary
Labofapenetrationtester
DCShadow - Minimal permissions, Active Directory Deception, Shadowception and more
Home of Nikhil SamratAshok Mittal. Posts about Red Teaming, Offensive PowerShell, Active Directory and Pen Testing.
Arbitrary, Unsigned Code Execution Vector in Microsoft.Workflow.Compiler.exe
https://posts.specterops.io/arbitrary-unsigned-code-execution-vector-in-microsoft-workflow-compiler-exe-3d9294bc5efb
@WindowsHackingLibrary
https://posts.specterops.io/arbitrary-unsigned-code-execution-vector-in-microsoft-workflow-compiler-exe-3d9294bc5efb
@WindowsHackingLibrary
Medium
Arbitrary, Unsigned Code Execution Vector in Microsoft.Workflow.Compiler.exe
Bypass Technique Denoscription
Forwarded from Security Talks (Jonhnathan Jonhnathan Jonhnathan)
YouTube
SANS Webcast: PowerShell for PenTesting
Learn ethical hacking: www.sans.org/sec504
Presented by: Mick Douglas
Attendees of this talk will learn why attackers have latched on to PowerShell. Mick will discuss how bad guys use this built in OS component to dodge many defensive techniques.
Mick…
Presented by: Mick Douglas
Attendees of this talk will learn why attackers have latched on to PowerShell. Mick will discuss how bad guys use this built in OS component to dodge many defensive techniques.
Mick…
w0rk3r's Windows Hacking Library
Arbitrary, Unsigned Code Execution Vector in Microsoft.Workflow.Compiler.exe https://posts.specterops.io/arbitrary-unsigned-code-execution-vector-in-microsoft-workflow-compiler-exe-3d9294bc5efb @WindowsHackingLibrary
Microsoft.Workflow.Compiler.exe Mimikatz Runner.
https://gist.github.com/caseysmithrc/b1190e023cd29c1910c01a164675a22e
@WindowsHackingLibrary
https://gist.github.com/caseysmithrc/b1190e023cd29c1910c01a164675a22e
@WindowsHackingLibrary
List-RDP-Connections-History
Use powershell to list the RDP Connections History of logged-in users or all users
https://github.com/3gstudent/List-RDP-Connections-History
@WindowsHackingLibrary
Use powershell to list the RDP Connections History of logged-in users or all users
https://github.com/3gstudent/List-RDP-Connections-History
@WindowsHackingLibrary
GitHub
GitHub - 3gstudent/List-RDP-Connections-History: Use powershell to list the RDP Connections History of logged-in users or all users
Use powershell to list the RDP Connections History of logged-in users or all users - 3gstudent/List-RDP-Connections-History
Forwarded from Zer0 to her0 (Jonhnathan Jonhnathan Jonhnathan)
A Universal Windows Bootkit
An analysis of the MBR bootkit referred to as “HDRoot"
http://williamshowalter.com/a-universal-windows-bootkit
@FromZer0toHero
An analysis of the MBR bootkit referred to as “HDRoot"
http://williamshowalter.com/a-universal-windows-bootkit
@FromZer0toHero
William Showalter
A Universal Windows Bootkit
An analysis of the MBR bootkit referred to as “HDRoot”
.NET Deserialization To NTLM Hashes
https://www.digitalinterruption.com/single-post/2018/04/22/NET-Deserialization-to-NTLM-hashes
@WindowsHackingLibrary
https://www.digitalinterruption.com/single-post/2018/04/22/NET-Deserialization-to-NTLM-hashes
@WindowsHackingLibrary