Commit Graph

243 Commits (992732877fa5bb0d335faeeb4f614bc24bc36f9e)

Author SHA1 Message Date
Swissky 0cee482b32
Merge pull request #239 from zero77/patch-1
Update Linux - Persistence.md
2020-09-23 17:30:32 +02:00
Swissky 229502c497
Update Linux - Persistence.md 2020-09-23 17:29:34 +02:00
Swissky 1a0e31a05e Zero Logon - Restore pwd 2020-09-18 21:21:55 +02:00
Swissky f4ef56fca0 Mimikatz Zerologon + reset pwd 2020-09-17 14:05:54 +02:00
Swissky 62678c26ce .NET Zero Logon 2020-09-16 14:31:59 +02:00
Swissky 14586e4d7a ZeroLogon via Mimikatz 2020-09-16 14:13:40 +02:00
Swissky e79918bdc2 CVE-2020-1472 Unauthenticated domain controller compromise 2020-09-14 23:06:09 +02:00
Swissky bcd700c951 AWS API calls that return credentials - kmcquade 2020-09-06 17:11:30 +02:00
zero77 f1d55a132a
Update Linux - Persistence.md 2020-09-02 09:43:25 +00:00
Swissky cc95f4e386 AD - Forest to Forest compromise 2020-08-18 09:33:38 +02:00
Justin Perdok f11c45650b
Update Active Directory Attack.md 2020-08-17 13:18:30 +00:00
Justin Perdok 1284715128
Update Active Directory Attack.md 2020-08-17 13:15:33 +00:00
Justin Perdok 6f3f2239fa
GenericWrite and Remote Connection Manager
Added content from https://sensepost.com/blog/2020/ace-to-rce/
2020-08-17 13:00:04 +00:00
Swissky 33129f2b4c Silver Ticket with services list 2020-08-09 19:25:03 +02:00
Swissky c7e3ea005e Powershell Remoting 2020-08-09 12:15:56 +02:00
Swissky 767eb04af6 Persistence - Typo 2020-07-21 19:48:57 +02:00
Swissky ca9326b5fc Driver Privilege Escalation 2020-07-13 15:00:36 +02:00
Swissky dd40ddd233 XSS summary subentries + GraphTCP 2020-07-12 14:44:33 +02:00
Artiom Mocrenco 62443a3753
fix typo 2020-07-08 18:01:12 +03:00
Artiom Mocrenco 2d7d6d6eed
Add TLS-PSK OpenSSL reverse shell method 2020-07-08 17:01:38 +03:00
Swissky 5b1a79cb56 Docker device file breakout 2020-07-04 19:00:56 +02:00
Swissky ecf29c2cbe Active Directory - Mitigations 2020-06-18 11:55:48 +02:00
Swissky 71ddb449ce Windows Persistence 2020-06-01 21:37:32 +02:00
Swissky 5323ceb37c SUDO CVE + Windows Drivers PrivEsc 2020-05-28 11:19:16 +02:00
Swissky 4ca5e71c2f Bind shell cheatsheet (Fix #194) 2020-05-24 14:09:46 +02:00
Swissky c1731041b5 Misc & Tricks Page + AMSI + Defender 2020-05-16 13:22:55 +02:00
Swissky eb074393df Windows Persistence - Binary replacing 2020-05-13 23:07:39 +02:00
Swissky a65fdbb568 XSW 4 Fix #205 2020-05-12 14:27:25 +02:00
Swissky e95a4aeac0 MSOL AD Spray 2020-05-11 17:08:03 +02:00
Swissky 3ed2b28e59 Add user /Y + GPO Powerview 2020-05-10 23:16:29 +02:00
Swissky 7f1c150edd Mimikatz Summary 2020-05-10 16:17:10 +02:00
joker2a 32b83da302
Update Linux - Privilege Escalation.md
Add new privesc for (Centos/Redhat)
Writable /etc/sysconfig/network-scripts/
2020-05-04 11:44:24 +02:00
guanicoe 1fc8b57c85
Update Windows - Privilege Escalation.md
added Get-Process to list processes
2020-05-03 21:11:01 +00:00
Swissky 5163ef902c XSS Google Scholar Payload + Skeleton Key Persistence 2020-05-03 16:28:17 +02:00
Swissky 04899355ad Magic Hashes + SQL fuzz 2020-04-26 21:43:42 +02:00
Th1b4ud 7c8e9ac4ce Typo 2020-04-22 16:01:49 +02:00
Th1b4ud 14d03b96a1 Linux privesc - SSH Key Predictable PRNG (Authorized_Keys) Process - Summary 2020-04-22 16:00:31 +02:00
Th1b4ud 2e507a2b2f Linux privesc - SSH Key Predictable PRNG (Authorized_Keys) Process 2020-04-22 15:55:10 +02:00
Th1b4ud 2740600a6b
Alternative TTY method with /usr/bin/script 2020-04-21 19:21:51 +02:00
Swissky 89f906f7a8 Fix issue - C reverse shell 2020-04-21 11:17:39 +02:00
Swissky af6760ef7a RoadRecon + JSON None refs 2020-04-17 16:34:51 +02:00
Th1b4ud 29194a8ef1
Add others shell on reverse shell cheatsheet
Add others shell on reverse shell cheatsheet
2020-04-13 19:06:01 +02:00
Swissky 6e7af5a267 Docker Registry - Pull/Download 2020-04-04 18:27:41 +02:00
M4x 1d299f55c9
Delete unnecessary escape characters
`whoami` has already been wrapped in backquotes. There is no need to user escape characters again
2020-03-29 23:40:39 +08:00
Swissky be8f32b586 Docker escape and exploit 2020-03-29 16:48:09 +02:00
Swissky 95ab07b45e CloudTrail disable, GraphQL tool 2020-03-28 12:01:56 +01:00
guenicoe a3cc577ebd
added cmd on the USOSVC vuln
Added `cmd \c C:\Users\nc.exe` as not typing `cmd \c` did not work for me. Might need even more explanation
2020-03-24 20:15:59 +00:00
PixeL 1b190939c4
Remove example from win priv esc
This example was used on hackthebox where it leaked the root flag of a machine on free servers.
This resulted in every user being able to get the root flag before they have even completed the box which isn't fair to others.

This example should either be changed or removed completely to combat copy-pasting without knowing what you're doing.
2020-03-23 17:17:42 -05:00
Fanis Katsimpas 2bdbb2dbc5
Update Windows - Privilege Escalation.md
Make powershell on EoP - Runas easier to copy paste
2020-03-22 19:25:35 +00:00
Swissky 1538ccd7f2 Gaining AWS Console Access via API Keys 2020-03-19 11:59:49 +01:00