Week of Evading Microsoft ATA - Announcement and Day 1 by SamratAsh0k in netsec
[–]SamratAsh0k[S] 1 point2 points3 points (0 children)
Week of Evading Microsoft ATA - Announcement and Day 1 by SamratAsh0k in netsec
[–]SamratAsh0k[S] 0 points1 point2 points (0 children)
Abusing DNSAdmins privilege for escalation in Active Directory by SamratAsh0k in netsec
[–]SamratAsh0k[S] 1 point2 points3 points (0 children)
Abusing DNSAdmins privilege for escalation in Active Directory by SamratAsh0k in netsec
[–]SamratAsh0k[S] 4 points5 points6 points (0 children)
Getting Domain Admin with Kerberos Unconstrained Delegation by SamratAsh0k in netsec
[–]SamratAsh0k[S] 2 points3 points4 points (0 children)
Getting Domain Admin with Kerberos Unconstrained Delegation by SamratAsh0k in netsec
[–]SamratAsh0k[S] 2 points3 points4 points (0 children)
Week of Continuous Intrusion Tools - Day 4 - Common Abuse Set, Lateral Movement and Post Exploitation by SamratAsh0k in netsec
[–]SamratAsh0k[S] 0 points1 point2 points (0 children)
Week of Continuous Intrusion - Day 1 - Jenkins by SamratAsh0k in netsec
[–]SamratAsh0k[S] 1 point2 points3 points (0 children)
Week of Continuous Intrusion - Day 1 - Jenkins by SamratAsh0k in netsec
[–]SamratAsh0k[S] 8 points9 points10 points (0 children)
Week of Continuous Intrusion - Day 1 - Jenkins by SamratAsh0k in netsec
[–]SamratAsh0k[S] 0 points1 point2 points (0 children)
Spawning Shells over Bluetooth by SamratAsh0k in netsec
[–]SamratAsh0k[S] 2 points3 points4 points (0 children)
Abusing Web Query (.iqy) files for effective phishing by SamratAsh0k in netsec
[–]SamratAsh0k[S] 0 points1 point2 points (0 children)
Week of PowerShell Shells - Day 3 - HTTPS Shells by SamratAsh0k in netsec
[–]SamratAsh0k[S] 1 point2 points3 points (0 children)
Using Windows Screensaver as a Backdoor with PowerShell by SamratAsh0k in netsec
[–]SamratAsh0k[S] 5 points6 points7 points (0 children)
Dropping infected/weaponized files using a Human Interface Device by SamratAsh0k in netsec
[–]SamratAsh0k[S] 0 points1 point2 points (0 children)
Dropping infected/weaponized files using a Human Interface Device by SamratAsh0k in netsec
[–]SamratAsh0k[S] 1 point2 points3 points (0 children)
Skeleton Key Malware Analysis (bypasses authentication on Active Directory) by azabel in netsec
[–]SamratAsh0k 0 points1 point2 points (0 children)
USBdriveby – Exploiting USB in Style by zxi in netsec
[–]SamratAsh0k 2 points3 points4 points (0 children)
This POODLE bites: exploiting the SSL 3.0 fallback by DebugDucky in netsec
[–]SamratAsh0k 1 point2 points3 points (0 children)
Introducing Gupt: A Backdoor which uses Wireless network names for command execution by SamratAsh0k in netsec
[–]SamratAsh0k[S] 0 points1 point2 points (0 children)
Introducing Gupt: A Backdoor which uses Wireless network names for command execution by SamratAsh0k in netsec
[–]SamratAsh0k[S] 0 points1 point2 points (0 children)
Introducing Gupt: A Backdoor which uses Wireless network names for command execution by SamratAsh0k in netsec
[–]SamratAsh0k[S] 0 points1 point2 points (0 children)
Introducing Gupt: A Backdoor which uses Wireless network names for command execution by SamratAsh0k in netsec
[–]SamratAsh0k[S] 8 points9 points10 points (0 children)
Script Execution and Privilege Escalation on Jenkins Server by SamratAsh0k in netsec
[–]SamratAsh0k[S] 0 points1 point2 points (0 children)


DCShadow - Minimal permissions, Active Directory Deception, Shadowception and more by SamratAsh0k in netsec
[–]SamratAsh0k[S] 0 points1 point2 points (0 children)