Commit Graph

233 Commits (6e526de7b4f361f9088fa1c17fc821ee95cb87b5)

Author SHA1 Message Date
Justin Perdok f11c45650b
Update Active Directory Attack.md 2020-08-17 13:18:30 +00:00
Justin Perdok 1284715128
Update Active Directory Attack.md 2020-08-17 13:15:33 +00:00
Justin Perdok 6f3f2239fa
GenericWrite and Remote Connection Manager
Added content from https://sensepost.com/blog/2020/ace-to-rce/
2020-08-17 13:00:04 +00:00
Swissky 33129f2b4c Silver Ticket with services list 2020-08-09 19:25:03 +02:00
Swissky c7e3ea005e Powershell Remoting 2020-08-09 12:15:56 +02:00
Swissky 767eb04af6 Persistence - Typo 2020-07-21 19:48:57 +02:00
Swissky ca9326b5fc Driver Privilege Escalation 2020-07-13 15:00:36 +02:00
Swissky dd40ddd233 XSS summary subentries + GraphTCP 2020-07-12 14:44:33 +02:00
Artiom Mocrenco 62443a3753
fix typo 2020-07-08 18:01:12 +03:00
Artiom Mocrenco 2d7d6d6eed
Add TLS-PSK OpenSSL reverse shell method 2020-07-08 17:01:38 +03:00
Swissky 5b1a79cb56 Docker device file breakout 2020-07-04 19:00:56 +02:00
Swissky ecf29c2cbe Active Directory - Mitigations 2020-06-18 11:55:48 +02:00
Swissky 71ddb449ce Windows Persistence 2020-06-01 21:37:32 +02:00
Swissky 5323ceb37c SUDO CVE + Windows Drivers PrivEsc 2020-05-28 11:19:16 +02:00
Swissky 4ca5e71c2f Bind shell cheatsheet (Fix #194) 2020-05-24 14:09:46 +02:00
Swissky c1731041b5 Misc & Tricks Page + AMSI + Defender 2020-05-16 13:22:55 +02:00
Swissky eb074393df Windows Persistence - Binary replacing 2020-05-13 23:07:39 +02:00
Swissky a65fdbb568 XSW 4 Fix #205 2020-05-12 14:27:25 +02:00
Swissky e95a4aeac0 MSOL AD Spray 2020-05-11 17:08:03 +02:00
Swissky 3ed2b28e59 Add user /Y + GPO Powerview 2020-05-10 23:16:29 +02:00
Swissky 7f1c150edd Mimikatz Summary 2020-05-10 16:17:10 +02:00
joker2a 32b83da302
Update Linux - Privilege Escalation.md
Add new privesc for (Centos/Redhat)
Writable /etc/sysconfig/network-scripts/
2020-05-04 11:44:24 +02:00
guanicoe 1fc8b57c85
Update Windows - Privilege Escalation.md
added Get-Process to list processes
2020-05-03 21:11:01 +00:00
Swissky 5163ef902c XSS Google Scholar Payload + Skeleton Key Persistence 2020-05-03 16:28:17 +02:00
Swissky 04899355ad Magic Hashes + SQL fuzz 2020-04-26 21:43:42 +02:00
Th1b4ud 7c8e9ac4ce Typo 2020-04-22 16:01:49 +02:00
Th1b4ud 14d03b96a1 Linux privesc - SSH Key Predictable PRNG (Authorized_Keys) Process - Summary 2020-04-22 16:00:31 +02:00
Th1b4ud 2e507a2b2f Linux privesc - SSH Key Predictable PRNG (Authorized_Keys) Process 2020-04-22 15:55:10 +02:00
Th1b4ud 2740600a6b
Alternative TTY method with /usr/bin/script 2020-04-21 19:21:51 +02:00
Swissky 89f906f7a8 Fix issue - C reverse shell 2020-04-21 11:17:39 +02:00
Swissky af6760ef7a RoadRecon + JSON None refs 2020-04-17 16:34:51 +02:00
Th1b4ud 29194a8ef1
Add others shell on reverse shell cheatsheet
Add others shell on reverse shell cheatsheet
2020-04-13 19:06:01 +02:00
Swissky 6e7af5a267 Docker Registry - Pull/Download 2020-04-04 18:27:41 +02:00
M4x 1d299f55c9
Delete unnecessary escape characters
`whoami` has already been wrapped in backquotes. There is no need to user escape characters again
2020-03-29 23:40:39 +08:00
Swissky be8f32b586 Docker escape and exploit 2020-03-29 16:48:09 +02:00
Swissky 95ab07b45e CloudTrail disable, GraphQL tool 2020-03-28 12:01:56 +01:00
guenicoe a3cc577ebd
added cmd on the USOSVC vuln
Added `cmd \c C:\Users\nc.exe` as not typing `cmd \c` did not work for me. Might need even more explanation
2020-03-24 20:15:59 +00:00
PixeL 1b190939c4
Remove example from win priv esc
This example was used on hackthebox where it leaked the root flag of a machine on free servers.
This resulted in every user being able to get the root flag before they have even completed the box which isn't fair to others.

This example should either be changed or removed completely to combat copy-pasting without knowing what you're doing.
2020-03-23 17:17:42 -05:00
Fanis Katsimpas 2bdbb2dbc5
Update Windows - Privilege Escalation.md
Make powershell on EoP - Runas easier to copy paste
2020-03-22 19:25:35 +00:00
Swissky 1538ccd7f2 Gaining AWS Console Access via API Keys 2020-03-19 11:59:49 +01:00
Swissky 1f3a94ba88 AWS SSM + Shadow copy attack 2020-03-06 15:30:38 +01:00
Swissky 5d87804f71 AWS EC2 Instance Connect + Lambda + SSM 2020-03-06 13:33:14 +01:00
Swissky c19e36ad34 Azure AD Connect - MSOL Account's password and DCSync 2020-03-01 17:06:31 +01:00
Swissky 71a307a86b AWS - EC2 copy image 2020-02-29 12:56:00 +01:00
Swissky 74f2dfccca Kerberos Constrained Delegation 2020-02-23 21:20:46 +01:00
Swissky c5ac4e9eff AWS Patterns 2020-02-23 20:58:53 +01:00
Swissky 915946a343 Fix Cloud Training 2020-02-21 10:50:43 +01:00
Swissky bda7100a77 Fix Cloud references 2020-02-21 10:47:16 +01:00
Swissky 984078050b Cloud - Pentest with AWS and Azure 2020-02-21 10:36:01 +01:00
Swissky 7f0650dfc0 IIS Raid Persistence 2020-02-20 16:51:22 +01:00