Swissky
|
0443babe35
|
Relay + MSSQL Read File
|
2021-03-25 18:25:02 +01:00 |
|
Swissky
|
f6b9d63bf8
|
DCOM exploitation and MSSQL CLR
|
2021-03-24 22:26:23 +01:00 |
|
Swissky
|
bd2166027e
|
GMSA Password + Dart Reverse Shell
|
2021-03-24 12:44:35 +01:00 |
|
c14dd49h
|
ca28c69e67
|
Update Active Directory Attack.md
|
2021-02-26 14:14:10 +01:00 |
|
Swissky
|
8d31b7240b
|
Office Attacks
|
2021-02-21 20:17:57 +01:00 |
|
Swissky
|
092083af5c
|
AD - Printer Bug + Account Lock
|
2021-01-29 22:10:22 +01:00 |
|
Swissky
|
3a6ac550b8
|
DSRM Admin
|
2021-01-08 23:41:50 +01:00 |
|
Tim Gates
|
7846225bfd
|
docs: fix simple typo, accound -> account
There is a small typo in Methodology and Resources/Active Directory Attack.md.
Should read `account` rather than `accound`.
|
2020-12-23 09:16:40 +11:00 |
|
Swissky
|
16b207eb0b
|
LAPS Password
|
2020-12-20 21:45:41 +01:00 |
|
Swissky
|
67752de6e9
|
Bronze Bit Attack
|
2020-12-18 22:38:30 +01:00 |
|
Swissky
|
f7e8f515a5
|
Application Escape and Breakout
|
2020-12-17 08:56:58 +01:00 |
|
Swissky
|
73fdd6e218
|
Mimikatz - Elevate token with LSA protection
|
2020-12-09 23:33:40 +01:00 |
|
Swissky
|
19a2950b8d
|
AMSI + Trust
|
2020-12-08 14:31:01 +01:00 |
|
Swissky
|
e13f152b74
|
AD - Recon
|
2020-12-02 18:43:13 +01:00 |
|
Swissky
|
b918095775
|
AzureHound
|
2020-11-24 12:41:34 +01:00 |
|
Swissky
|
bd184487e5
|
NTLM Hashcat
|
2020-11-06 16:20:03 +01:00 |
|
Vincent Gilles
|
0b90094002
|
Fix(Docs): Correcting typos on the repo
|
2020-10-17 22:52:35 +02:00 |
|
Swissky
|
b32f4754d7
|
Keytab + schtasks
|
2020-10-15 12:35:05 +02:00 |
|
@cnagy
|
ec1f89fbe6
|
Updated Responder link and added InveighZero
|
2020-10-02 04:39:09 +00:00 |
|
Swissky
|
1a0e31a05e
|
Zero Logon - Restore pwd
|
2020-09-18 21:21:55 +02:00 |
|
Swissky
|
f4ef56fca0
|
Mimikatz Zerologon + reset pwd
|
2020-09-17 14:05:54 +02:00 |
|
Swissky
|
62678c26ce
|
.NET Zero Logon
|
2020-09-16 14:31:59 +02:00 |
|
Swissky
|
14586e4d7a
|
ZeroLogon via Mimikatz
|
2020-09-16 14:13:40 +02:00 |
|
Swissky
|
e79918bdc2
|
CVE-2020-1472 Unauthenticated domain controller compromise
|
2020-09-14 23:06:09 +02:00 |
|
Swissky
|
cc95f4e386
|
AD - Forest to Forest compromise
|
2020-08-18 09:33:38 +02:00 |
|
Justin Perdok
|
f11c45650b
|
Update Active Directory Attack.md
|
2020-08-17 13:18:30 +00:00 |
|
Justin Perdok
|
1284715128
|
Update Active Directory Attack.md
|
2020-08-17 13:15:33 +00:00 |
|
Justin Perdok
|
6f3f2239fa
|
GenericWrite and Remote Connection Manager
Added content from https://sensepost.com/blog/2020/ace-to-rce/
|
2020-08-17 13:00:04 +00:00 |
|
Swissky
|
33129f2b4c
|
Silver Ticket with services list
|
2020-08-09 19:25:03 +02:00 |
|
Swissky
|
ca9326b5fc
|
Driver Privilege Escalation
|
2020-07-13 15:00:36 +02:00 |
|
Swissky
|
ecf29c2cbe
|
Active Directory - Mitigations
|
2020-06-18 11:55:48 +02:00 |
|
Swissky
|
5323ceb37c
|
SUDO CVE + Windows Drivers PrivEsc
|
2020-05-28 11:19:16 +02:00 |
|
Swissky
|
4ca5e71c2f
|
Bind shell cheatsheet (Fix #194)
|
2020-05-24 14:09:46 +02:00 |
|
Swissky
|
3ed2b28e59
|
Add user /Y + GPO Powerview
|
2020-05-10 23:16:29 +02:00 |
|
Swissky
|
7f1c150edd
|
Mimikatz Summary
|
2020-05-10 16:17:10 +02:00 |
|
Swissky
|
5163ef902c
|
XSS Google Scholar Payload + Skeleton Key Persistence
|
2020-05-03 16:28:17 +02:00 |
|
Swissky
|
af6760ef7a
|
RoadRecon + JSON None refs
|
2020-04-17 16:34:51 +02:00 |
|
Swissky
|
95ab07b45e
|
CloudTrail disable, GraphQL tool
|
2020-03-28 12:01:56 +01:00 |
|
Swissky
|
71a307a86b
|
AWS - EC2 copy image
|
2020-02-29 12:56:00 +01:00 |
|
Swissky
|
74f2dfccca
|
Kerberos Constrained Delegation
|
2020-02-23 21:20:46 +01:00 |
|
Swissky
|
aba6874517
|
Maps API + secretsdump enabled user/pw last set + certutil mimikatz
|
2020-02-06 21:41:29 +01:00 |
|
Swissky
|
be0397fa68
|
BloodHound ZIP + Zero Width space tip
|
2020-01-19 22:46:45 +01:00 |
|
Swissky
|
71171fa78b
|
SSRF exploiting WSGI
|
2020-01-05 22:11:28 +01:00 |
|
Swissky
|
3a9b9529cb
|
Mimikatz - Credential Manager & DPAPI
|
2020-01-05 17:27:02 +01:00 |
|
Swissky
|
73abdeed71
|
Kerberos AD GPO
|
2020-01-05 16:28:00 +01:00 |
|
Swissky
|
b052f78d95
|
Blacklist3r and Machine Key
|
2020-01-02 23:33:04 +01:00 |
|
Swissky
|
0a6ac284c9
|
AdminSDHolder Abuse
|
2019-12-30 19:55:47 +01:00 |
|
Swissky
|
bcb24c9866
|
Abusing Active Directory ACLs/ACEs
|
2019-12-30 14:22:10 +01:00 |
|
Swissky
|
4b10c5e302
|
AD mitigations
|
2019-12-26 12:09:23 +01:00 |
|
Swissky
|
cf5a4b6e97
|
XSLT injection draft
|
2019-12-17 21:13:59 +01:00 |
|