SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GPO) in order to compromise the objects that are controlled by that GPO.
https://github.com/mwrlabs/SharpGPOAbuse
@WindowsHackingLibrary
https://github.com/mwrlabs/SharpGPOAbuse
@WindowsHackingLibrary
GitHub
GitHub - FSecureLABS/SharpGPOAbuse: SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's…
SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GPO) in order to compromise the objects that are contr...
An SMB Relay Race – How To Exploit LLMNR and SMB Message Signing for Fun and Profit
https://www.blackhillsinfosec.com/an-smb-relay-race-how-to-exploit-llmnr-and-smb-message-signing-for-fun-and-profit
@WindowsHackingLibrary
https://www.blackhillsinfosec.com/an-smb-relay-race-how-to-exploit-llmnr-and-smb-message-signing-for-fun-and-profit
@WindowsHackingLibrary
Black Hills Information Security, Inc.
An SMB Relay Race - How To Exploit LLMNR and SMB Message Signing for Fun and Profit - Black Hills Information Security, Inc.
Jordan Drysdale// This is basically a slight update and rip off of Marcello’s work out here: https://byt3bl33d3r.github.io/practical-guide-to-ntlm-relaying-in-2017-aka-getting-a-foothold-in-under-5-minutes.html /tl;dr – Zero to DA on an environment through…
Finding Weaknesses Before the Attackers Do
https://www.fireeye.com/blog/threat-research/2019/04/finding-weaknesses-before-the-attackers-do.html
@WindowsHackingLibrary
https://www.fireeye.com/blog/threat-research/2019/04/finding-weaknesses-before-the-attackers-do.html
@WindowsHackingLibrary
The Death Metal Suite
https://www.coalfire.com/The-Coalfire-Blog/April-2019/The-Death-Metal-Suite
@WindowsHackingLibrary
https://www.coalfire.com/The-Coalfire-Blog/April-2019/The-Death-Metal-Suite
@WindowsHackingLibrary
Coalfire
The Death Metal Suite
Death Metal is a toolkit designed to exploit AMT’s legitimate features, as the AMT framework’s functionality, designed for innocent system administration…
Bypassing AD account lockout for a compromised account
https://medium.com/@markmotig/bypassing-ad-account-lockout-for-a-compromised-account-5c908d663de8
@WindowsHackingLibrary
https://medium.com/@markmotig/bypassing-ad-account-lockout-for-a-compromised-account-5c908d663de8
@WindowsHackingLibrary
Medium
Bypassing AD account lockout for a compromised account
This is for educational purposes only. Never do security testing on a machine you do not own or have permission to test on. If you don’t…
HostRecon: A Situational Awareness Tool
https://www.blackhillsinfosec.com/hostrecon-situational-awareness-tool
@WindowsHackingLibrary
https://www.blackhillsinfosec.com/hostrecon-situational-awareness-tool
@WindowsHackingLibrary
Black Hills Information Security, Inc.
HostRecon: A Situational Awareness Tool - Black Hills Information Security, Inc.
Beau Bullock // Overview HostRecon is a tool I wrote in PowerShell to assist with quickly enumerating a number of items that I would typically check after gaining access to […]
Syncing Into the Shadows
https://jsecurity101.com/2019/Syncing-into-the-Shadows
@WindowsHackingLibrary
https://jsecurity101.com/2019/Syncing-into-the-Shadows
@WindowsHackingLibrary
Combining NTLM Relaying and Kerberos delegation
https://chryzsh.github.io/relaying-delegation
@WindowsHackingLibrary
https://chryzsh.github.io/relaying-delegation
@WindowsHackingLibrary
Antimalware Scan Interface (AMSI) — A Red Team Analysis on Evasion
https://iwantmore.pizza/posts/amsi.html
@WindowsHackingLibrary
https://iwantmore.pizza/posts/amsi.html
@WindowsHackingLibrary
Windows Exploitation Tricks: Abusing the User-Mode Debugger
https://googleprojectzero.blogspot.com/2019/04/windows-exploitation-tricks-abusing.html
@WindowsHackingLibrary
https://googleprojectzero.blogspot.com/2019/04/windows-exploitation-tricks-abusing.html
@WindowsHackingLibrary
Blogspot
Windows Exploitation Tricks: Abusing the User-Mode Debugger
Posted by James Forshaw, Google Project Zero I've recently been adding native user-mode debugger support to NtObjectManager . Whenever ...
Purple Team ATT&CK™ Automation
https://github.com/praetorian-inc/purple-team-attack-automation
@WindowsHackingLibrary
https://github.com/praetorian-inc/purple-team-attack-automation
@WindowsHackingLibrary
GitHub
GitHub - praetorian-inc/purple-team-attack-automation: Praetorian's public release of our Metasploit automation of MITRE ATT&CK™…
Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs - praetorian-inc/purple-team-attack-automation
Lateral Movement — SCM and Dll Hijacking Primer
https://posts.specterops.io/lateral-movement-scm-and-dll-hijacking-primer-d2f61e8ab992
@WindowsHackingLibrary
https://posts.specterops.io/lateral-movement-scm-and-dll-hijacking-primer-d2f61e8ab992
@WindowsHackingLibrary
Posts By SpecterOps Team Members
Lateral Movement — SCM and Dll Hijacking Primer
Using the Service Control Manager and built-in services for lateral movement.
Under-the-hood: WMImplant Invoking PowerShell
https://www.fortynorthsecurity.com/under-the-hood-wmimplant-invoking-powershell
@WindowsHackingLibrary
https://www.fortynorthsecurity.com/under-the-hood-wmimplant-invoking-powershell
@WindowsHackingLibrary
FortyNorth Security Blog
Under-the-hood: WMImplant Invoking PowerShell
WMImplant is a powerful PowerShell based tool that enables its users to conduct nearly any post-exploitation action and exclusively using WMI to do so. We’ve blogged about out-of-the-box detection opportunities for WMImplant, how to copy files, searching…
Windows 10 egghunter (wow64) and more
https://www.corelan.be/index.php/2019/04/23/windows-10-egghunter
@WindowsHackingLibrary
https://www.corelan.be/index.php/2019/04/23/windows-10-egghunter
@WindowsHackingLibrary
Corelan Team
Windows 10 egghunter (wow64) and more | Corelan Cybersecurity Research
Introduction Ok, I have a confession to make, I have always been somewhat intrigued by egghunters. That doesn't mean that I like to use (or abuse) an egghunter just because I fancy what it does. In fact, I believe it's a good practise to try to avoid egghunters…
Next Gen Phishing – Leveraging Azure Information Protection
https://www.trustedsec.com/2019/04/next-gen-phishing-leveraging-azure-information-protection
@WindowsHackingLibrary
https://www.trustedsec.com/2019/04/next-gen-phishing-leveraging-azure-information-protection
@WindowsHackingLibrary
TrustedSec
Cybersecurity Education from the Experts | TrustedSec Blog Posts
Learn more about how to safeguard your company through our educational blog posts on everything from updated tech to the newest scams infiltrating organizations today.
Getting in the Zone: dumping Active Directory DNS using adidnsdump
https://dirkjanm.io/getting-in-the-zone-dumping-active-directory-dns-with-adidnsdump
@WindowsHackingLibrary
https://dirkjanm.io/getting-in-the-zone-dumping-active-directory-dns-with-adidnsdump
@WindowsHackingLibrary
dirkjanm.io
Getting in the Zone: dumping Active Directory DNS using adidnsdump
Zone transfers are a classical way of performing reconnaissance in networks (or even from the internet). They require an insecurely configured DNS server that allows anonymous users to transfer all records and gather information about host in the network.…