HostRecon: A Situational Awareness Tool
https://www.blackhillsinfosec.com/hostrecon-situational-awareness-tool
@WindowsHackingLibrary
https://www.blackhillsinfosec.com/hostrecon-situational-awareness-tool
@WindowsHackingLibrary
Black Hills Information Security, Inc.
HostRecon: A Situational Awareness Tool - Black Hills Information Security, Inc.
Beau Bullock // Overview HostRecon is a tool I wrote in PowerShell to assist with quickly enumerating a number of items that I would typically check after gaining access to […]
Syncing Into the Shadows
https://jsecurity101.com/2019/Syncing-into-the-Shadows
@WindowsHackingLibrary
https://jsecurity101.com/2019/Syncing-into-the-Shadows
@WindowsHackingLibrary
Combining NTLM Relaying and Kerberos delegation
https://chryzsh.github.io/relaying-delegation
@WindowsHackingLibrary
https://chryzsh.github.io/relaying-delegation
@WindowsHackingLibrary
Antimalware Scan Interface (AMSI) — A Red Team Analysis on Evasion
https://iwantmore.pizza/posts/amsi.html
@WindowsHackingLibrary
https://iwantmore.pizza/posts/amsi.html
@WindowsHackingLibrary
Windows Exploitation Tricks: Abusing the User-Mode Debugger
https://googleprojectzero.blogspot.com/2019/04/windows-exploitation-tricks-abusing.html
@WindowsHackingLibrary
https://googleprojectzero.blogspot.com/2019/04/windows-exploitation-tricks-abusing.html
@WindowsHackingLibrary
Blogspot
Windows Exploitation Tricks: Abusing the User-Mode Debugger
Posted by James Forshaw, Google Project Zero I've recently been adding native user-mode debugger support to NtObjectManager . Whenever ...
Purple Team ATT&CK™ Automation
https://github.com/praetorian-inc/purple-team-attack-automation
@WindowsHackingLibrary
https://github.com/praetorian-inc/purple-team-attack-automation
@WindowsHackingLibrary
GitHub
GitHub - praetorian-inc/purple-team-attack-automation: Praetorian's public release of our Metasploit automation of MITRE ATT&CK™…
Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs - praetorian-inc/purple-team-attack-automation
Lateral Movement — SCM and Dll Hijacking Primer
https://posts.specterops.io/lateral-movement-scm-and-dll-hijacking-primer-d2f61e8ab992
@WindowsHackingLibrary
https://posts.specterops.io/lateral-movement-scm-and-dll-hijacking-primer-d2f61e8ab992
@WindowsHackingLibrary
Posts By SpecterOps Team Members
Lateral Movement — SCM and Dll Hijacking Primer
Using the Service Control Manager and built-in services for lateral movement.
Under-the-hood: WMImplant Invoking PowerShell
https://www.fortynorthsecurity.com/under-the-hood-wmimplant-invoking-powershell
@WindowsHackingLibrary
https://www.fortynorthsecurity.com/under-the-hood-wmimplant-invoking-powershell
@WindowsHackingLibrary
FortyNorth Security Blog
Under-the-hood: WMImplant Invoking PowerShell
WMImplant is a powerful PowerShell based tool that enables its users to conduct nearly any post-exploitation action and exclusively using WMI to do so. We’ve blogged about out-of-the-box detection opportunities for WMImplant, how to copy files, searching…
Windows 10 egghunter (wow64) and more
https://www.corelan.be/index.php/2019/04/23/windows-10-egghunter
@WindowsHackingLibrary
https://www.corelan.be/index.php/2019/04/23/windows-10-egghunter
@WindowsHackingLibrary
Corelan Team
Windows 10 egghunter (wow64) and more | Corelan Cybersecurity Research
Introduction Ok, I have a confession to make, I have always been somewhat intrigued by egghunters. That doesn't mean that I like to use (or abuse) an egghunter just because I fancy what it does. In fact, I believe it's a good practise to try to avoid egghunters…
Next Gen Phishing – Leveraging Azure Information Protection
https://www.trustedsec.com/2019/04/next-gen-phishing-leveraging-azure-information-protection
@WindowsHackingLibrary
https://www.trustedsec.com/2019/04/next-gen-phishing-leveraging-azure-information-protection
@WindowsHackingLibrary
TrustedSec
Cybersecurity Education from the Experts | TrustedSec Blog Posts
Learn more about how to safeguard your company through our educational blog posts on everything from updated tech to the newest scams infiltrating organizations today.
Getting in the Zone: dumping Active Directory DNS using adidnsdump
https://dirkjanm.io/getting-in-the-zone-dumping-active-directory-dns-with-adidnsdump
@WindowsHackingLibrary
https://dirkjanm.io/getting-in-the-zone-dumping-active-directory-dns-with-adidnsdump
@WindowsHackingLibrary
dirkjanm.io
Getting in the Zone: dumping Active Directory DNS using adidnsdump
Zone transfers are a classical way of performing reconnaissance in networks (or even from the internet). They require an insecurely configured DNS server that allows anonymous users to transfer all records and gather information about host in the network.…
Weaponizing Privileged File Writes with Windows Collector Service
https://rastamouse.me/2019/04/weaponizing-privileged-file-writes-with-windows-collector-service
@WindowsHackingLibrary
https://rastamouse.me/2019/04/weaponizing-privileged-file-writes-with-windows-collector-service
@WindowsHackingLibrary
Building Meterpreter for the CLR
Part1:
https://vimeo.com/331977092
Part2:
https://vimeo.com/332426022
Part3:
https://vimeo.com/332827701
Part4:
https://vimeo.com/333091819
@WindowsHackingLibrary
Part1:
https://vimeo.com/331977092
Part2:
https://vimeo.com/332426022
Part3:
https://vimeo.com/332827701
Part4:
https://vimeo.com/333091819
@WindowsHackingLibrary
Vimeo
CLR Meterpreter - Part 1
The first in the new series of streams! We're building a .NET Meterpreter implementation from scratch. In this stream, we're just going over what's…
Designing Peer-To-Peer Command and Control
https://posts.specterops.io/designing-peer-to-peer-command-and-control-ad2c61740456
@WindowsHackingLibrary
https://posts.specterops.io/designing-peer-to-peer-command-and-control-ad2c61740456
@WindowsHackingLibrary
Medium
Designing Peer-To-Peer Command and Control
In this post we will discuss the design and implementation of peer-to-peer command and control protocols in general, as well as the…
Evil Clippy: MS Office maldoc assistant
https://outflank.nl/blog/2019/05/05/evil-clippy-ms-office-maldoc-assistant
@WindowsHackingLibrary
https://outflank.nl/blog/2019/05/05/evil-clippy-ms-office-maldoc-assistant
@WindowsHackingLibrary
T1093: Process Hollowing and Portable Executable Relocations
https://ired.team/offensive-security/t1055-process-injection/process-hollowing-and-pe-image-relocations
@WindowsHackingLibrary
https://ired.team/offensive-security/t1055-process-injection/process-hollowing-and-pe-image-relocations
@WindowsHackingLibrary
www.ired.team
Process Hollowing and Portable Executable Relocations
Code injection, evasion
Bypassing Windows Defender: One TCP Socket Away From Meterpreter and Beacon Sessions
https://ired.team/offensive-security/bypassing-windows-defender-one-tcp-socket-away-from-meterpreter-and-cobalt-strike-beacon
@WindowsHackingLibrary
https://ired.team/offensive-security/bypassing-windows-defender-one-tcp-socket-away-from-meterpreter-and-cobalt-strike-beacon
@WindowsHackingLibrary
ired.team
Bypassing Windows Defender: One TCP Socket Away From Meterpreter and Beacon Sessions