Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

61 total results found

Articles

AD KRB

Protected Users Group  This is for when you are RESTRICTED or otherwise unable to do things due to being in the Protected Users group. Attacking Not-So-Protected User Sessions | Medium

Articles

AD RELAY

TrustedSec | I’m bringing relaying back: A comprehensive guide on… Relay | The Hacker Recipes

Relay Diagram

AD RELAY

Thanks Relay | The Hacker Recipes

Persistence Resources

References

These are things I want to research further: https://pentestlab.blog/2020/01/21/persistence-wmi-event-subscription/ https://learn.microsoft.com/en-us/windows/win32/wmisdk/managed-object-format--mof- https://attack.mitre.org/techniques/T1218/010/ https://...

ATP records, studies, etc.

References APTs/Strategies

VX Underground vx-underground.org

.NET Version

Windows Specific .NET PowerShell Reflection

If you are trying to detonate in an environment using PowerShell <5 (Most companies are only going to be using standard powershell) you MUST make sure that the  output/resulting binary targets a lower/longlife version of .NET. For instance, net48/net4.0. If y...

References

Windows Specific COM

https://learn.microsoft.com/en-us/windows/win32/com/component-object-model--com--portal https://en.wikipedia.org/wiki/Component_Object_Model https://learn.microsoft.com/en-us/windows/win32/com/com-fundamentals https://learn.microsoft.com/en-us/dotnet/csha...

CHM

Windows Specific

Creating a CHM can be done using the Free Pascal Compiler or Ide on Linux sudo apt-get install fp-ide sudo apt-get install fp-compiler The CHM can be compiled using the installed 'chmcmd' program. Guide Thanks, Copilot: 📁 Step-by-Step Guide Make Conte...