Recently Updated Pages
Flammekueche
[!IMPORTANT] Cette recette est basée sur la recette de Flam's (R) [!info] Prévoir environ 30 m...
L'overflow __scanf
On peut commencer par voir les protections associées à notre binaire : ┌──(arthur㉿LAPTOP-KSNUF8N7...
FootHold
Scan Initial Dans de nombreux cas, les machines Windows ne répondent pas aux requêtes ping. Un sc...
La méthode du trampoline (x86)
Contrairement à la méthode du saut direct que nous avons vu précédemment dans BOF1 sur TryHackMe ...
ShellCode Injection
Pour l'injection de shellcode, les étapes sont relativement similaires au détournement de fonctio...
Function HiJack
Pour récupérer l'accès à une fonction, il nous faut : L'adresse de la fonction La taille du padd...
GDB
Comme je n'étais pas hyper convaincu par le cours de TryHackMe, j'ai creusé ailleurs. Quoi qu'il ...
Other Attacks
In the previous tasks, the assumption is that we already had initial access to a system and were ...
Local Administrator Password Solution (LAPS)
This task discusses how to enumerate and obtain a local administrator password within the Active ...
Windows Credential Manager
This task introduces the Windows Credential Manager and discusses the technique used for dumping ...
Local Security Authority Subsystem Service (LSASS)
What is the LSASS? Local Security Authority Server Service (LSASS) is a Windows process that han...
Conclusion
Recap In this room, we discussed the various approaches to obtaining users' credentials, includi...
Domain Controller
This task discusses the required steps to dump Domain Controller Hashes locally and remotely. NT...
Local Windows Credentials
In general, Windows operating system provides two types of user accounts: Local and Domain. Local...
Credential Access
Credential Access Credential access is where adversaries may find credentials in compromised sys...
Managing Users
Your first task as the new domain administrator is to check the existing AD OUs and users, as som...
Active Directory
The core of any Windows Domain is the Active Directory Domain Service (AD DS). This service acts ...
Persistence through GPOs
The last persistence technique we will review is persistence through Group Policy Objects (GPOs)....
Persistence through ACLs
Sometimes, we need more than just persisting to normal AD groups. What if we want to persist to a...
Persistence through Tickets
As discussed in the previous tasks, we often want to persist through service accounts with delega...