Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

98 total results found

Moving Laterally Using WMI

Red Team - Windows Active Directory - Lateral Movement and...

We can also perform many techniques discussed in the previous task differently by using Windows Management Instrumentation (WMI). WMI is Windows implementation of Web-Based Enterprise Management (WBEM), an enterprise standard for accessing management informati...

Use of Alternate Authentication Material

Red Team - Windows Active Directory - Lateral Movement and...

By alternate authentication material, we refer to any piece of data that can be used to access a Windows account without actually knowing a user's password itself. This is possible because of how some authentication protocols used by Windows networks work. In ...

Abusing User Behaviour

Red Team - Windows Active Directory - Lateral Movement and...

Under certain circumstances, an attacker can take advantage of actions performed by users to gain further access to machines in the network. While there are many ways this can happen, we will look at some of the most common ones. Abusing Writable Shares It...

Port Forwarding

Red Team - Windows Active Directory - Lateral Movement and...

Most of the lateral movement techniques we have presented require specific ports to be available for an attacker. In real-world networks, the administrators may have blocked some of these ports for security reasons or have implemented segmentation around the n...

Conclusion

Red Team - Windows Active Directory - Lateral Movement and...

In this room, we have discussed the many ways an attacker can move around a network once they have a set of valid credentials. From an attacker's perspective, having as many different techniques as possible to perform lateral movement will always be helpful as...

Process Layout

Red Team - Buffer Overflows

When a program runs on a machine, the computer runs the program as a process. Current computer architecture allows multiple processes to be run concurrently(at the same time by a computer). While these processes may appear to run at the same time, the computer...

x86-64 Procedures

Red Team - Buffer Overflows

A program would usually comprise of multiple functions and there needs to be a way of tracking which function has been called, and which data is passed from one function to another. The stack is a region of contiguous memory addresses and it is used to make it...

Procedures Continued

Red Team - Buffer Overflows

The explanation assumes that the current point of execution is inside the calc function. In this case calc is known as the caller function and add is known as the callee function. The following presents the assembly code inside the calc function The add...

Endianess

Red Team - Buffer Overflows

In the above programs, you can see that the binary information is represented in hexadecimal format. Different architectures actually represent the same hexadecimal number in different ways, and this is what is referred to as Endianess. Let’s take the value of...

Overwriting Variables

Red Team - Buffer Overflows

Now that we’ve looked at all the background information, let’s explore how the overflows actually work. If you take a look at the overflow-1 folder, you’ll notice some C code with a binary program. Your goal is to change the value of the integer variable.  ...

Overwriting Function Pointers

Red Team - Buffer Overflows

For this example, look at the overflow- 2 folder. Inside this folder, you’ll notice the following C code. Similar to the example above, data is read into a buffer using the gets function, but the variable above the buffer is not a pointer to a function. A p...

Buffer Overflows

Red Team - Buffer Overflows

For this example, look at overflow-3 folder. Inside this folder, you’ll find the following C code. This example will cover some of the more interesting, and useful things you can do with a buffer overflow. In the previous examples, we’ve seen that when a prog...

Exploiting Permission Delegation

Red Team - Windows Active Directory - Exploiting

Active Directory can delegate permissions and privileges through a feature called Permission Delegation (not to be confused with Kerberos Delegation that will be discussed in the next task). Delegation is what makes AD so powerful in organisations. Imagine we ...

Exploiting Kerberos Delegation

Red Team - Windows Active Directory - Exploiting

Next, we will take a look at Kerberos Delegation. When you talk about AD Delegation, this is usually what is being discussed, not Permission Delegation. Kerberos Delegation The practical use of Kerberos Delegation is to enable an application to access resour...

Exploiting Automated Relays

Red Team - Windows Active Directory - Exploiting

In this task we will take a look at some automated relays. Authentication attempts are constantly flying across the network, and as shown in the Breaching AD room, if we are lucky, we can intercept some of these challenges to gain access. But what if we don't ...

Exploiting AD Users

Red Team - Windows Active Directory - Exploiting

We have gotten quite far with our exploitation up to this point. We have full administrative access to workstations and servers. Essentially, we can perform post-exploitation on almost any Tier 1 and Tier 2 system. But we still want to go further. This next ta...

Exploiting GPOs

Red Team - Windows Active Directory - Exploiting

Keylogging the user allowed us to decrypt their credential database, providing us with credentials that can be useful to further our goal of AD exploitation, namely the svcServMan account. We need to perform a bit of enumeration to figure out what these creden...

Exploiting Certificates

Red Team - Windows Active Directory - Exploiting

Now that we have access to THMSERVER2, we have furthered our journey of exploiting AD by exploiting all Tier 1 assets (servers). However, we are again stuck without the simple means to move to the next tier. So again, we will need to look for more creative pat...

Kouign Amann

Recipes

[!IMPORTANT] Cette recette se base sur la recette originale du président de l'association du Kouign Amann de Douarnenez [!info] Prévoir environ 3 à 4 heures dans une pièce froide +20°C Ingrédients Pour la pâte : 200g de Farine 4g de Sel 4g de levure 140g ...

Exploiting Domain Trusts

Red Team - Windows Active Directory - Exploiting

Even though we have access to Tier 0 infrastructure, this is still not enough. We have only exploited the ZA.TRYHACKME.LOC domain. Surely TRYHACKME must have domains for other regions as well? Well, if we take control of the root domain, TRYHACKME.LOC, we will...