Command and Control Using Active Directory
http://www.harmj0y.net/blog/powershell/command-and-control-using-active-directory
@WindowsHackingLibrary
http://www.harmj0y.net/blog/powershell/command-and-control-using-active-directory
@WindowsHackingLibrary
SMB hash hijacking & user tracking in MS Outlook
https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2018/may/smb-hash-hijacking-and-user-tracking-in-ms-outlook
@WindowsHackingLibrary
https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2018/may/smb-hash-hijacking-and-user-tracking-in-ms-outlook
@WindowsHackingLibrary
SharpBox is a C# tool for compressing, encrypting, and exfiltrating data to DropBox using the DropBox API
https://github.com/P1CKLES/SharpBox
@WindowsHackingLibrary
https://github.com/P1CKLES/SharpBox
@WindowsHackingLibrary
GitHub
GitHub - P1CKLES/SharpBox: SharpBox is a C# tool for compressing, encrypting, and exfiltrating data to DropBox using the DropBox…
SharpBox is a C# tool for compressing, encrypting, and exfiltrating data to DropBox using the DropBox API. - GitHub - P1CKLES/SharpBox: SharpBox is a C# tool for compressing, encrypting, and exfil...
From Kekeo to Rubeus
https://posts.specterops.io/from-kekeo-to-rubeus-86d2ec501c14
https://github.com/GhostPack/Rubeus
@WindowsHackingLibrary
https://posts.specterops.io/from-kekeo-to-rubeus-86d2ec501c14
https://github.com/GhostPack/Rubeus
@WindowsHackingLibrary
Medium
From Kekeo to Rubeus
Kekeo, the other big project from Benjamin Delpy after Mimikatz, is an awesome code base with a set of great features. As Benjamin states, it’s external to the Mimikatz codebase because, “I hate to…
AppLocker CLM Bypass via COM
https://www.mdsec.co.uk/2018/09/applocker-clm-bypass-via-com
@WindowsHackingLibrary
https://www.mdsec.co.uk/2018/09/applocker-clm-bypass-via-com
@WindowsHackingLibrary
Injdrv is a proof-of-concept Windows Driver for injecting DLL into user-mode processes using APC
https://github.com/wbenny/injdrv
@WindowsHackingLibrary
https://github.com/wbenny/injdrv
@WindowsHackingLibrary
GitHub
GitHub - wbenny/injdrv: proof-of-concept Windows Driver for injecting DLL into user-mode processes using APC
proof-of-concept Windows Driver for injecting DLL into user-mode processes using APC - wbenny/injdrv
Responder and Layer 2 Pivots
https://ijustwannared.team/2017/05/27/responder-and-layer-2-pivots
@WindowsHackingLibrary
https://ijustwannared.team/2017/05/27/responder-and-layer-2-pivots
@WindowsHackingLibrary
ijustwannaredteam
Responder and Layer 2 Pivots
Hey all, In the previous post we discussed using Responder with Snarf, this post will be doing the same but through a pivot. To pivot in we’ll be using Simpletun and a layer 2 pivoting clien…
PowerShell: Documenting your environment by running systeminfo on all Domain-Computers
https://sid-500.com/2017/08/09/powershell-documenting-your-environment-by-running-systeminfo-on-all-domain-computers
@WindowsHackingLibrary
https://sid-500.com/2017/08/09/powershell-documenting-your-environment-by-running-systeminfo-on-all-domain-computers
@WindowsHackingLibrary
SID-500.COM
PowerShell: Documenting your environment by running systeminfo on all Domain-Computers
Systeminfo gives you a perfect overview of your system. But what about the other systems in your domain? Sure, you can use 3rd Party Tools or SCCM. But the number of those who can´t use enterprise …
The power of backup operators
https://decoder.cloud/2018/02/12/the-power-of-backup-operatos
@WindowsHackingLibrary
https://decoder.cloud/2018/02/12/the-power-of-backup-operatos
@WindowsHackingLibrary
Decoder's Blog
The power of backup operators
“Backup Operators” group is an historical Windows built in group. It was designed to allow its members to perform backup and restore operations by granting the SeBackupPrivilege and the…
Abusing Windows Library Files for Persistence
https://www.countercept.com/blog/abusing-windows-library-files-for-persistence
@WindowsHackingLibrary
https://www.countercept.com/blog/abusing-windows-library-files-for-persistence
@WindowsHackingLibrary
Domain Controlller Print Server + Unconstrained Kerberos Delegation = Pwned Active Directory Forest
https://adsecurity.org/?p=4056
@WindowsHackingLibrary
https://adsecurity.org/?p=4056
@WindowsHackingLibrary
Active Directory & Azure AD/Entra ID Security
Domain Controller Print Server + Unconstrained Kerberos Delegation = Pwned Active Directory Forest
At DerbyCon 8 (2018) over the weekend Will Schroeder (@Harmj0y), Lee Christensen (@Tifkin_), & Matt Nelson (@enigma0x3), spoke about the unintended risks of trusting AD. They cover a number of interesting persistence and privilege escalation methods, though…
invoke-Confusion .NET attacker of Powershell Remotely
https://homjxi0e.wordpress.com/2018/10/02/invoke-confusion-attack-of-powershell
@WindowsHackingLibrary
https://homjxi0e.wordpress.com/2018/10/02/invoke-confusion-attack-of-powershell
@WindowsHackingLibrary
matthomjxi0e
invoke-Confusion .NET attacker of Powershell Remotely
Introduction extremely a splendid Invoke-Confusion is collections of modules Powershell inclusive some researches the modern between them .NET Reflection. Assembly, however, It contains aspects of …
Creating Persistence with DCShadow
https://blog.stealthbits.com/creating-persistence-with-dcshadow
@WindowsHackingLibrary
https://blog.stealthbits.com/creating-persistence-with-dcshadow
@WindowsHackingLibrary
Insider Threat Security Blog
Creating Persistence with DCShadow | Insider Threat Security Blog
Now that we understand the basics of the DCShadow feature, let’s look at some ways in which attackers can leverage DCShadow in a real world attack scenario. As we learned, DCShadow requires elevated rights such as Domain Admin, so you can assume an attacker…
Time Travel Debugging: finding Windows GDI flaws
https://www.pentestpartners.com/security-blog/time-travel-debugging-finding-windows-gdi-flaws
@WindowsHackingLibrary
https://www.pentestpartners.com/security-blog/time-travel-debugging-finding-windows-gdi-flaws
@WindowsHackingLibrary
Pentestpartners
Time Travel Debugging: finding Windows GDI flaws | Pen Test Partners
Introduction Microsoft Patches for October 2018 included a total of 49 security patches. There were many interesting ones including kernel privilege escalation as well as critical ones which could lead […]
Malicious use of Microsoft “Local Administrator Password Solution”
http://archive.hack.lu/2017/HackLU_2017_Malicious_use_LAPS_Clementz_Goichot.pdf
@WindowsHackingLibrary
http://archive.hack.lu/2017/HackLU_2017_Malicious_use_LAPS_Clementz_Goichot.pdf
@WindowsHackingLibrary
ServiceFu: Harvesting Service Account Credentials Remotely
https://www.securifera.com/blog/2018/10/07/servicefu
@WindowsHackingLibrary
https://www.securifera.com/blog/2018/10/07/servicefu
@WindowsHackingLibrary
Securifera
serviceFu
serviceFu
In a recent assessment our team found itself in a somewhat new situation that resulted in a useful tool we wanted to share with the community. The assessment started with us gaining initial access into a customer's network. This particular customer…
In a recent assessment our team found itself in a somewhat new situation that resulted in a useful tool we wanted to share with the community. The assessment started with us gaining initial access into a customer's network. This particular customer…
Operating Offensively Against Sysmon
https://www.darkoperator.com/blog/2018/10/5/operating-offensively-against-sysmon
@WindowsHackingLibrary
https://www.darkoperator.com/blog/2018/10/5/operating-offensively-against-sysmon
@WindowsHackingLibrary
Shell is Only the Beginning
Operating Offensively Against Sysmon
Sysmon is a tool written by Mark Russinovich that I have covered in multiple blog post and even wrote a PowerShell module called Posh-Sysmon to help with the generation of configuration files for it. Its main purpose is for the tracking of potentially malicious…
Forwarded from Security papers (Jonhnathan Jonhnathan Jonhnathan)
Exploiting Regedit: Invisible Persistence & Binary Storage
https://github.com/ewhitehats/InvisiblePersistence/blob/master/InvisibleRegValues_Whitepaper.pdf
@CyberWhitePapers
https://github.com/ewhitehats/InvisiblePersistence/blob/master/InvisibleRegValues_Whitepaper.pdf
@CyberWhitePapers
GitHub
InvisiblePersistence/InvisibleRegValues_Whitepaper.pdf at master · ewhitehats/InvisiblePersistence
Persisting in the Windows registry "invisibly". Contribute to ewhitehats/InvisiblePersistence development by creating an account on GitHub.