Cardboard Iguana Security
/
tags
/
AttackCycle
Dark mode
Light mode
Search
Search
144 items with this tag.
Sunday, January 5, 2025
Abusing wildcard expansion in Bash
Language/Bash
Application/tar
AttackCycle/Exploitation
OS/Linux
Sunday, January 5, 2025
Aircrack-NG
Application/Aircrack
AttackCycle/Reconnaissance
AttackCycle/Exploitation
Protocol/WiFi
Sunday, January 5, 2025
AS-REP roasting
Protocol/Kerberos
OS/Windows/ActiveDirectory
Cryptography/Hashes/NT
AttackCycle/Exploitation/AS-REPRoasting
AttackCycle/Exploitation/Kerberoasting
Sunday, January 5, 2025
AS-REP roasting with Impacket
OS/Windows/ActiveDirectory
AttackCycle/Exploitation/AS-REPRoasting
Application/Impacket
Protocol/Kerberos
Sunday, January 5, 2025
AS-REP roasting With Rubeus
OS/Windows/ActiveDirectory
AttackCycle/Exploitation/AS-REPRoasting
Application/Rubeus
Application/Hashcat
Sunday, January 5, 2025
Avoid dropping privileges with SUID Bash
Language/Bash
AttackCycle/Exploitation
HowTo
Sunday, January 5, 2025
awk
Application/awk
Application/sudo
AttackCycle/PrivEsc
Sunday, January 5, 2025
Backdoor Visual Basic Scripts
AttackCycle/Exploitation
HowTo
Language/VisualBasic
FileFormat/VBS
Protocol/SMB
OS/Windows
Sunday, January 5, 2025
Bash reverse shell
Language/Bash
AttackCycle/LateralMovement
Application/netcat
Application/socat
Sunday, January 5, 2025
Burp Suite
Application/BurpSuite
AttackCycle/Reconnaissance/Fuzzing
AttackCycle/Exploitation/BruteForcing
OS/Linux/Distros/Kali
Sunday, January 5, 2025
Bypass the PowerShell execution policy
Application/PowerShell
OS/Windows
HowTo
AttackCycle/Exploitation
Sunday, January 5, 2025
Bypass Windows antivirus with C#
HowTo
AttackCycle/AntiForensics
OS/Windows
Application/PowerShell
Application/PowerShell/Invoke-Mimikatz
Sunday, January 5, 2025
Call Mimikatz from a meterpreter shell
Application/Metasploit/meterpreter
OS/Windows/ActiveDirectory
Protocol/Kerberos
AttackCycle/PrivEsc
AttackCycle/LateralMovement
AttackCycle/Exploitation
Sunday, January 5, 2025
cewl
Application/cewl
OS/Linux/Distros/Kali
AttackCycle/Reconnaissance
Sunday, January 5, 2025
Confirm the existence of a Gmail address
Application/curl
WebApplication/Gmail
HowTo
AttackCycle/Reconnaissance
Sunday, January 5, 2025
crackmapexec
Application/crackmapexec
Protocol/SMB
AttackCycle/Exploitation
Sunday, January 5, 2025
Cross-site scripting (XSS) attacks
FileFormat/HTML
Language/JavaScript
AttackCycle/Exploitation/XSS
AttackCycle/AntiForensics
Standard/URI
AttackCycle/Exfiltration
Sunday, January 5, 2025
CUPP
Application/CUPP
OS/Linux/Distros/Kali
AttackCycle/Exploitation/BruteForcing
Sunday, January 5, 2025
Default CIFS shares
Protocol/SMB
OS/Windows
AttackCycle/PrivEsc
AttackCycle/Exploitation
Sunday, January 5, 2025
dig
Application/dig
AttackCycle/Reconnaissance
Protocol/DNS
Sunday, January 5, 2025
Disable AMSI
HowTo
OS/Windows/AMSI
AttackCycle/AntiForensics
Application/PowerShell
OS/Windows/Defender
Sunday, January 5, 2025
Easy reverse DNS lookups
AttackCycle/Reconnaissance
Protocol/DNS
Sunday, January 5, 2025
Enumerate AD CS templates with CertUtil
HowTo
Application/CertUtil
OS/Windows/ActiveDirectory
AttackCycle/Reconnaissance
Protocol/Kerberos
Application/Rubeus
Sunday, January 5, 2025
Evil-WinRM
Application/Evil-WinRM
AttackCycle/LateralMovement
Cryptography/Hashes/NT
Protocol/WinRM
Sunday, January 5, 2025
Exploit LD_LIBRARY_PATH
HowTo
OS/Linux
AttackCycle/Exploitation
Application/sudo
Application/ldd
Sunday, January 5, 2025
Exploit LD_PRELOAD
HowTo
OS/Linux
Application/sudo
AttackCycle/Exploitation
Sunday, January 5, 2025
Exploit local Windows services
OS/Windows/Services
AttackCycle/Exploitation
Application/Metasploit/msfvenom
OS/Windows/EventLog
HowTo
Sunday, January 5, 2025
Exploit local Windows tasks
OS/Windows/Tasks
AttackCycle/Exploitation
Application/PsExec
OS/Windows/Registry
AttackCycle/AntiForensics
HowTo
Application/icacls
Sunday, January 5, 2025
Exploit remote Windows services
OS/Windows/Services
AttackCycle/LateralMovement
OS/Windows/UAC
Protocol/RCP
Protocol/SMB
Protocol/NetBIOS
HowTo
Sunday, January 5, 2025
Exploit remote Windows tasks
OS/Windows/Tasks
AttackCycle/LateralMovement
OS/Windows/UAC
Protocol/RCP
Protocol/SMB
Protocol/NetBIOS
HowTo
Sunday, January 5, 2025
Exploit weak /etc/passwd permissions
HowTo
OS/Linux
AttackCycle/PrivEsc
Sunday, January 5, 2025
Exploit weak /etc/shadow permissions
HowTo
OS/Linux
AttackCycle/PrivEsc
Sunday, January 5, 2025
Exploit the Windows DLL search order
AttackCycle/Exploitation
HowTo
OS/Windows
Sunday, January 5, 2025
Exploit the Windows “Feature on Demand” Helper
OS/Windows/Registry
AttackCycle/PrivEsc
HowTo
Sunday, January 5, 2025
Exploit Windows file associations
HowTo
AttackCycle/Exploitation
OS/Windows/Registry
Application/PowerShell
Application/netcat
Sunday, January 5, 2025
Exploit Windows HTML applications with msfvenom
FileFormat/HTA
FileFormat/HTML
Application/Metasploit/msfvenom
AttackCycle/Exploitation
HowTo
Application/netcat
Application/Metasploit
Sunday, January 5, 2025
Exploit Windows services
OS/Windows/Services
AttackCycle/Exploitation
AttackCycle/LateralMovement
HowTo
Sunday, January 5, 2025
Exploit Windows shortcut files
AttackCycle/Exploitation
HowTo
Application/PowerShell
Application/netcat
OS/Windows
Sunday, January 5, 2025
Exploit Windows tasks
OS/Windows/Tasks
AttackCycle/Exploitation
AttackCycle/LateralMovement
HowTo
Sunday, January 5, 2025
Exploit the WinLogon initialization sequence
OS/Windows/WinLogin
OS/Windows/Registry
AttackCycle/Exploitation
HowTo
Sunday, January 5, 2025
find
Application/find
AttackCycle/Reconnaissance
Application/sudo
AttackCycle/PrivEsc
Sunday, January 5, 2025
Find executables with SUID capabilities
HowTo
Application/getcap
AttackCycle/Reconnaissance
OS/Linux/Permissions
Sunday, January 5, 2025
finger
Application/finger
AttackCycle/Reconnaissance
Sunday, January 5, 2025
FTP
Application/ftp
Protocol/FTP
Application/sudo
AttackCycle/PrivEsc
Sunday, January 5, 2025
fuff
Application/fuff
AttackCycle/Reconnaissance/Fuzzing
AttackCycle/Exploitation/BruteForcing
Sunday, January 5, 2025
Get a shell from ViM
Application/ViM
AttackCycle/PrivEsc
LoLBins
Sunday, January 5, 2025
Get-WinEvent
OS/Windows/EventLog
Application/PowerShell
AttackCycle/Reconnaissance
Sunday, January 5, 2025
gobuster
Application/gobuster
AttackCycle/Reconnaissance
Sunday, January 5, 2025
Golden and silver ticket attacks
Protocol/Kerberos
OS/Windows/ActiveDirectory
Cryptography/Hashes/NT
AttackCycle/PrivEsc/GoldenTickets
AttackCycle/LateralMovement/SilverTickets
Sunday, January 5, 2025
The Harvester
Application/TheHarvester
AttackCycle/Reconnaissance
Sunday, January 5, 2025
Hashcat
Application/Hashcat
Application/Metasploit
AttackCycle/PrivEsc
Cryptography/Hashes/MD5
Cryptography/Hashes/SHA1
Cryptography/Hashes/MD4
Cryptography/Hashes/NT
Cryptography/Hashes/SHA256
Cryptography/Hashes/SHA512
Cryptography/Hashes/LANMAN
Cryptography/Hashes/bcrypt
Cryptography/Hashes/AS-REP
Cryptography/Hashes/TGS-REP
AttackCycle/Exploitation/AS-REPRoasting
Sunday, January 5, 2025
How to exploit the Bash PS4 (debugging) prompt
Language/Bash
AttackCycle/PrivEsc
HowTo
Sunday, January 5, 2025
Hydra
Application/Hydra
AttackCycle/Exploitation/BruteForcing
Sunday, January 5, 2025
iftop
Application/iftop
Application/sudo
AttackCycle/PrivEsc
Sunday, January 5, 2025
IIS configuration data
OS/Windows/IIS
AttackCycle/Reconnaissance
Sunday, January 5, 2025
Invoke-Mimikatz
Application/PowerShell/Invoke-Mimikatz
AttackCycle/PrivEsc
AttackCycle/LateralMovement
Protocol/Kerberos
OS/Windows/ActiveDirectory
AttackCycle/Reconnaissance
AttackCycle/PrivEsc/PassTheHash
AttackCycle/LateralMovement/PassTheHash
Sunday, January 5, 2025
IPSec
Protocol/IPSec
Application/ike-scan
Application/psk-crack
AttackCycle/Exploitation
Sunday, January 5, 2025
Java
Language/Java
Application/netcat
Protocol/HTTP
OS/Linux/Distros/Kali
AttackCycle/Exploitation
Sunday, January 5, 2025
John the Ripper
Application/JohnTheRipper
AttackCycle/PrivEsc
Application/Metasploit
Application/grep
Application/cewl
Application/CUPP
Application/Hashcat
Cryptography/Hashes
Application/SSH
Sunday, January 5, 2025
JSON Web Tokens (JWTs)
Standard/JWT
AttackCycle/Exploitation
AttackCycle/Exploitation/BruteForcing
Protocol/HTTP
Cryptography/Signatures
Sunday, January 5, 2025
Kerberoasting
Protocol/Kerberos
OS/Windows/ActiveDirectory
AttackCycle/Exploitation/Kerberoasting
Application/PowerShell/Invoke-Kerberoast
Application/Hashcat
Application/JohnTheRipper
Sunday, January 5, 2025
Kerberoasting with Impacket
OS/Windows/ActiveDirectory
Protocol/Kerberos
AttackCycle/Exploitation/Kerberoasting
Application/Impacket
Application/Hashcat
OS/Linux/Distros/Kali
Sunday, January 5, 2025
Kerberoasting with Rubeus
OS/Windows/ActiveDirectory
Protocol/Kerberos
AttackCycle/Exploitation/Kerberoasting
Application/Rubeus
Application/Hashcat
Sunday, January 5, 2025
Kerberos
Protocol/Kerberos
OS/Windows/ActiveDirectory
Application/Mimikatz
Application/Rubeus
FileFormat/kirbi
Cryptography/Hashes/NT
AttackCycle/PrivEsc
AttackCycle/LateralMovement
AttackCycle/Exploitation/Kerberoasting
Application/PowerShell/Invoke-Kerberoast
Application/Hashcat
Application/JohnTheRipper
OS/Linux/Distros/Kali
AttackCycle/Exploitation/AS-REPRoasting
AttackCycle/PrivEsc/GoldenTickets
AttackCycle/LateralMovement/SilverTickets
Sunday, January 5, 2025
Kerbrute
Protocol/Kerberos
Protocol/UDP
OS/Windows/ActiveDirectory
Application/Kerbrute
AttackCycle/Reconnaissance/BruteForcing
Sunday, January 5, 2025
less
Application/less
Application/sudo
AttackCycle/PrivEsc
Sunday, January 5, 2025
Load a shell with a simple executable
HowTo
AttackCycle/Exploitation
Application/Metasploit/msfvenom
Language/Bash
Sunday, January 5, 2025
Local file inclusion (LFI) attacks
AttackCycle/Exploitation/LocalFileInclusion
Language/PHP
Sunday, January 5, 2025
Magic numbers
Language/PHP
AttackCycle/AntiForensics
Sunday, January 5, 2025
man
Application/man
Application/sudo
AttackCycle/PrivEsc
Sunday, January 5, 2025
Match files to packages in Debian-based operating systems
HowTo
OS/Linux/Distros/Debian
AttackCycle/Reconnaissance
Application/dpkg-query
Sunday, January 5, 2025
Match files to packages in Red Hat-based operating systems
HowTo
OS/Linux/Distros/RedHat
OS/AIX
AttackCycle/Reconnaissance
Application/rpm
Sunday, January 5, 2025
Metasploit MS SQL modules
Application/MSSQL
Application/Metasploit
Application/Nmap
AttackCycle/Reconnaissance
AttackCycle/Exploitation
AttackCycle/Exploitation/BruteForcing
Sunday, January 5, 2025
meterpreter
Application/Metasploit/meterpreter
AttackCycle/Exploitation
AttackCycle/Reconnaissance
AttackCycle/AntiForensics
Cryptography/Hashes/NT
OS/Windows/SAM
AttackCycle/PrivEsc/GoldenTickets
Application/Mimikatz
OS/Windows/EventLog
Application/PowerShell
AttackCycle/PrivEsc
OS/Windows/LSASS
Sunday, January 5, 2025
Mimikatz
Application/Mimikatz
AttackCycle/Reconnaissance
AttackCycle/LateralMovement
AttackCycle/PrivEsc
OS/Windows/ActiveDirectory
Protocol/Kerberos
Cryptography/Hashes/NT
Application/PsExec
Application/Evil-WinRM
Application/XFreeRDP
OS/Windows/LSASS
OS/Windows/SAM
AttackCycle/LateralMovement/SilverTickets
AttackCycle/PrivEsc/GoldenTickets
AttackCycle/PrivEsc/PassTheHash
AttackCycle/LateralMovement/PassTheHash
Sunday, January 5, 2025
more
Application/more
Application/cat
Application/sudo
AttackCycle/PrivEsc
AttackCycle/Exploitation
Sunday, January 5, 2025
msfconsole
Application/Metasploit/msfconsole
AttackCycle/CommandAndControl
AttackCycle/AntiForensics
AttackCycle/Exploitation
Application/SSH
Application/Nmap
Protocol/TCP
Protocol/UDP
Protocol/HTTP
Protocol/SMB
Protocol/SMTP
Application/MySQL
AttackCycle/Exploitation/BruteForcing
Cryptography/Hashes/NT
Application/Metasploit/msfvenom
Application/Metasploit/meterpreter
Application/PsExec
OS/Windows
Application/JohnTheRipper
Protocol/RDP
AttackCycle/LateralMovement
Application/proxychains
Protocol/SOCKS
Sunday, January 5, 2025
msfvenom
Application/Metasploit/msfvenom
AttackCycle/Exploitation
Application/netcat
OS/Linux
OS/Windows
OS/macOS
FileFormat/HTA
Application/Metasploit/meterpreter
Language/VisualBasic
Language/Bash
Language/Python
Language/Perl
Language/PHP
Language/Java
Sunday, January 5, 2025
MS SQL
Application/MSSQL
OS/Windows
Application/PowerShell/Powercat
Application/netcat
AttackCycle/PrivEsc
Sunday, January 5, 2025
MySQL
Application/MySQL
AttackCycle/Exploitation
AttackCycle/PrivEsc
Sunday, January 5, 2025
nano
Application/nano
Application/sudo
AttackCycle/PrivEsc
Sunday, January 5, 2025
nbtscan
Application/nbtscan
Protocol/SMB
AttackCycle/Reconnaissance
Sunday, January 5, 2025
net
OS/Windows
Application/net
AttackCycle/Reconnaissance
LoLBins
AttackCycle/PrivEsc
Sunday, January 5, 2025
netcat
Application/netcat
AttackCycle/Exploitation/XSS
AttackCycle/Exploitation/SQLi
AttackCycle/LateralMovement
Application/Nmap
Protocol/TCP
Protocol/UDP
Application/Metasploit/msfvenom
AttackCycle/Reconnaissance
Sunday, January 5, 2025
netstat
Application/netstat
OS/Linux
OS/Windows
Application/findstr
AttackCycle/Reconnaissance
Sunday, January 5, 2025
Nikto
Application/Nikto
AttackCycle/Reconnaissance
Sunday, January 5, 2025
Nmap
Application/Nmap
Protocol/TCP
OS/Windows/Firewall
Protocol/ICMP
AttackCycle/Reconnaissance
Protocol/UDP
Protocol/HTTP
Protocol/SOCKS
Hardware/MACAddress
Protocol/ARP
Protocol/SMB
Protocol/NFS
AttackCycle/PrivEsc
Sunday, January 5, 2025
Node.js
Application/NodeJS
AttackCycle/Exploitation
Sunday, January 5, 2025
Oracle SQL Server
Application/Oracle
Application/tnscmd10g
Application/oscanner
Application/sidguess
AttackCycle/Reconnaissance
Sunday, January 5, 2025
OWASP ZAP
Application/OWASPZAP
Application/BurpSuite
AttackCycle/Reconnaissance/Fuzzing
AttackCycle/Reconnaissance/BruteForcing
OS/Linux/Distros/Kali
Sunday, January 5, 2025
Perl
Language/Perl
AttackCycle/Exploitation
Application/netcat
Application/socat
Sunday, January 5, 2025
PHP
Language/PHP
AttackCycle/Exploitation
OS/Linux/Distros/Kali
Application/netcat
Application/socat
Sunday, January 5, 2025
PHP local file inclusion attacks
AttackCycle/Exploitation/LocalFileInclusion
Language/PHP
OS/Linux/Distros/Kali
AttackCycle/Exploitation/NullByteAttacks
Sunday, January 5, 2025
Poison null byte attack
AttackCycle/Exploitation/NullByteAttacks
Sunday, January 5, 2025
Poison null byte in PHP
AttackCycle/Exploitation/NullByteAttacks
Language/PHP
Sunday, January 5, 2025
Polkit
OS/Linux/Polkit
AttackCycle/PrivEsc
Sunday, January 5, 2025
Pop a SYSTEM shell on the Windows login screen using sticky keys
Application/icacls
OS/Windows
Application/takeown
AttackCycle/Exploitation
HowTo
Sunday, January 5, 2025
Pop a SYSTEM shell on the Windows login screen using Utilman
Application/icacls
Application/takeown
AttackCycle/Exploitation
OS/Windows
HowTo
Sunday, January 5, 2025
Port scanning with Bash
Language/Bash
AttackCycle/Reconnaissance
Protocol/TCP
Sunday, January 5, 2025
Powercat
Application/PowerShell/Powercat
AttackCycle/LateralMovement
Application/netcat
OS/Linux/Distros/Kali
OS/Windows/AMSI
Sunday, January 5, 2025
PowerShell reverse shell
Application/PowerShell
AttackCycle/Exploitation
Application/whoami
Language/PHP
Sunday, January 5, 2025
PowerView
Application/PowerShell/PowerView
AttackCycle/Reconnaissance
OS/Windows/AMSI
Sunday, January 5, 2025
Pull SSL certificates from an external server
Application/OpenSSL
HowTo
AttackCycle/Reconnaissance
Sunday, January 5, 2025
Python
Language/Python
Scripts
Application/netcat
Application/socat
AttackCycle/Exploitation
Sunday, January 5, 2025
Quick-n-dirty Python web server
Language/Python
Protocol/HTTP
AttackCycle/Exfiltration
AttackCycle/Exploitation
Sunday, January 5, 2025
RCE via XXE in PHP
AttackCycle/Exploitation/XXE
Language/PHP
FileFormat/XML
Sunday, January 5, 2025
Remotely install a Windows package with PowerShell
HowTo
OS/Windows
Application/PowerShell
AttackCycle/LateralMovement
AttackCycle/Exploitation
Sunday, January 5, 2025
Retrieve AIX fileset information
OS/AIX
HowTo
Application/lslpp
AttackCycle/Reconnaissance
Sunday, January 5, 2025
Retrieve AIX system information
OS/AIX
HowTo
Application/oslevel
AttackCycle/Reconnaissance
Sunday, January 5, 2025
Rubeus
Application/Rubeus
Protocol/Kerberos
OS/Windows/ActiveDirectory
AttackCycle/Reconnaissance
AttackCycle/Exploitation/BruteForcing
OS/Linux/Distros/Kali
AttackCycle/PrivEsc
Application/Certify
AttackCycle/LateralMovement
Sunday, January 5, 2025
Ruby
Language/Ruby
AttackCycle/Exploitation
Application/netcat
Application/socat
Sunday, January 5, 2025
Run a remote Windows command using PowerShell
Application/PowerShell
OS/Windows
AttackCycle/LateralMovement
HowTo
Sunday, January 5, 2025
Set up WMI in PowerShell
OS/Windows/WMI
Application/PowerShell
HowTo
AttackCycle/LateralMovement
Sunday, January 5, 2025
smbclient
Application/smbclient
Protocol/SMB
Protocol/FTP
Application/enum4linux
AttackCycle/Reconnaissance
OS/Linux
Sunday, January 5, 2025
socat
Application/socat
Application/netcat
Application/PowerShell
AttackCycle/LateralMovement
AttackCycle/AntiForensics
Sunday, January 5, 2025
SQL injection attacks
AttackCycle/Exploitation/SQLi
Language/PHP
Protocol/HTTP
Application/BurpSuite
Language/SQL
Application/MySQL
AttackCycle/PrivEsc
AttackCycle/Reconnaissance
Sunday, January 5, 2025
SQLMap
Application/SQLMap
AttackCycle/Exploitation/SQLi
Application/Metasploit/meterpreter
Application/MySQL
Application/PostgreSQL
Sunday, January 5, 2025
SSH
Application/SSH
AttackCycle/LateralMovement
Protocol/SOCKS
OS/Windows
Protocol/Kerberos
Sunday, January 5, 2025
sudo
Application/sudo
AttackCycle/Exploitation
Sunday, January 5, 2025
systemctl
Application/systemctl
AttackCycle/PrivEsc
Application/sudo
Sunday, January 5, 2025
systeminfo
Application/systeminfo
OS/Windows
Application/findstr
OS/Windows/ActiveDirectory
AttackCycle/Reconnaissance
Sunday, January 5, 2025
tar
Application/tar
AttackCycle/Exploitation
Sunday, January 5, 2025
tcpdump
Application/tcpdump
Application/Wireshark
AttackCycle/Reconnaissance
Sunday, January 5, 2025
Unquoted path handling in Windows
OS/Windows
AttackCycle/Exploitation
Sunday, January 5, 2025
Use Bash functions to “backdoor” executables
Language/Bash
AttackCycle/Exploitation
AttackCycle/PrivEsc
HowTo
Sunday, January 5, 2025
Useful built-in commands for Linux reconnaissance
OS/Linux
AttackCycle/Reconnaissance
LoLBins
Sunday, January 5, 2025
Useful built-in commands for Windows reconnaissance
OS/Windows
AttackCycle/Reconnaissance
Application/arp
Application/cmdkey
Application/driverquery
Application/hostname
Application/net
Application/query
Application/reg
OS/Windows/Services
OS/Windows/Tasks
Application/systeminfo
Application/whoami
Sunday, January 5, 2025
Useful Linux reconnaissance scripts
OS/Linux
AttackCycle/Reconnaissance
Sunday, January 5, 2025
Useful scripts for Windows reconnaissance
AttackCycle/Reconnaissance
OS/Windows
Application/WinPEAS
Application/Metasploit
Application/WindowsExploitSuggester
OS/Windows/Defender
Application/PowerShell/PowerUp
Application/Metasploit/meterpreter
Application/systeminfo
Sunday, January 5, 2025
Use the Windows Firewall to relay ports
OS/Windows/Firewall
AttackCycle/LateralMovement
HowTo
Application/netsh
Sunday, January 5, 2025
ViM
Language/Python
AttackCycle/PrivEsc
Application/ViM
Sunday, January 5, 2025
Visual Basic for Applications
Language/VisualBasic
OS/Windows/WSH
AttackCycle/Exploitation
Sunday, January 5, 2025
wfuzz
Application/wfuzz
AttackCycle/Reconnaissance/Fuzzing
Application/BurpSuite
Sunday, January 5, 2025
Windows logon scripts
OS/Windows/UserInit
OS/Windows/Registry
AttackCycle/Exploitation
AttackCycle/PrivEsc
Sunday, January 5, 2025
Windows reconnaissance with PowerShell
OS/Windows/ActiveDirectory
OS/Windows/Firewall
Application/PowerShell
OS/Windows
AttackCycle/Reconnaissance
OS/Windows/EventLog
OS/Windows/Services
Sunday, January 5, 2025
Windows Remote Management
Application/PowerShell
OS/Windows/Registry
OS/Windows/UAC
AttackCycle/LateralMovement
Protocol/WinRM
Sunday, January 5, 2025
Windows Scripting Host
OS/Windows/WSH
Language/VisualBasic
AttackCycle/Exploitation
Sunday, January 5, 2025
Windows SeImpersonate and SeAssignPrimaryToken permissions
OS/Windows/Permissions/SeImpersonate
OS/Windows/Permissions/SeAssignPrimaryToken
Protocol/WinRM
Application/RogueWinRM
Application/PowerShell
AttackCycle/LateralMovement
AttackCycle/PrivEsc
Sunday, January 5, 2025
Windows unattended installation data
OS/Windows
AttackCycle/Reconnaissance
Sunday, January 5, 2025
wmic
OS/Windows
Application/wmic
Application/WindowsExploitSuggester
AttackCycle/Reconnaissance
AttackCycle/Exploitation
AttackCycle/LateralMovement
Application/PowerShell
Sunday, January 5, 2025
Work with remote tasks using WMI and PowerShell
HowTo
Application/PowerShell
OS/Windows/Tasks
AttackCycle/Exploitation
AttackCycle/PrivEsc
OS/Windows/WMI
Sunday, January 5, 2025
XFreeRDP
Application/XFreeRDP
Cryptography/Hashes/NT
AttackCycle/LateralMovement
Sunday, January 5, 2025
XML external entity (XXE) attacks
AttackCycle/Exploitation/XXE
Standard/URI
FileFormat/XML
Sunday, January 5, 2025
Xterm
Application/Xterm
Protocol/X11
AttackCycle/LateralMovement