Penetration Testing Lab
我还没有学会写个人说明!
访问网站

作者专栏

Dumping Domain Password Hashes

Dumping Domain Password Hashes

It is very common during penetration tests where domain administrator access has been achieved to extract the passwo ...
SPN Discovery

SPN Discovery

Services that support Kerberos authentication require to have a Service Principal Name (SPN) associated to point use ...
Situational Awareness

Situational Awareness

A common step in the life-cycle of a red team engagement is to gather as much information is possible for the compro ...
Lateral Movement – WinRM

Lateral Movement – WinRM

WinRM stands for Windows Remote Management and is a service that allows administrators to perform management tasks o ...
AppLocker Bypass – CMSTP

AppLocker Bypass – CMSTP

CMSTP is a binary which is associated with the Microsoft Connection Manager Profile Installer. It accepts INF files ...
NBNS Spoofing

NBNS Spoofing

Netbios Name Service (NBT-NS) is used in Windows networks for communication between hosts. Systems will use this ser ...
Lateral Movement – RDP

Lateral Movement – RDP

The Remote Desktop Protocol (RDP) is widely used across internal networks by Administrators. This allows systems own ...
Skeleton Key

Skeleton Key

The Skeleton Key is a malware which is stored in memory which allows an attacker to authenticate as any domain user ...
Dumping Clear-Text Credentials

Dumping Clear-Text Credentials

Passwords in clear-text that are stored in a Windows host can allow penetration testers to perform lateral movement ...

分页导航