Post Exploitation Resources
Lateral movement
- Eventvwr File-less UAC Bypass CNA
- Lateral movement using excel application and dcom
- WSH Injection: A Case Study
- Fileless UAC Bypass using sdclt
- Bypassing AMSI via COM Server Hijacking
- Window 10 Device Guard Bypass
- My First Go with BloodHound
- OPSEC Considerations for beacon commands
- Agentless Post Exploitation
- Windows Access Tokens and Alternate credentials
- PSAmsi - An offensive PowerShell module for interacting with the Anti-Malware Scan Interface in Windows 10
- Lay of the Land with BloodHound
- Bringing the hashes home with reGeorg & Empire
- Intercepting passwords with Empire and winning
- Outlook Home Page – Another Ruler Vector
- Outlook Forms and Shells
- Windows Privilege Escalation Checklist
- A Guide to Configuring Throwback
- Abusing DNSAdmins privilege for escalation in Active Directory
- Using SQL Server for attacking a Forest Trust
- Extending BloodHound for Red Teamers
- Pass hash pass ticket no pain
- process doppelganging
- App Locker ByPass List
- Windows 7 UAC whitelist
- Malicious Application Compatibility Shims,
- Junfeng Zhang from WinSxS dev team blog,
- Beyond good ol' Run key, series of articles,
- KernelMode.Info UACMe thread,
- Command Injection/Elevation - Environment Variables Revisited,
- "Fileless" UAC Bypass Using eventvwr.exe and Registry Hijacking,
- Bypassing UAC on Windows 10 using Disk Cleanup,
- Using IARPUninstallStringLauncher COM interface to bypass UAC,
- Bypassing UAC using App Paths,
- "Fileless" UAC Bypass using sdclt.exe,
- UAC Bypass or story about three escalations,
- Exploiting Environment Variables in Scheduled Tasks for UAC Bypass,
- First entry: Welcome and fileless UAC bypass,
- Reading Your Way Around UAC in 3 parts:
Part 1.
Part 2.
Part 3.
- Research on CMSTP.exe,
- hiding registry keys with psreflect
- a guide to attacking domain trusts
Living Off The Land, Bins, and Useful Scripts
Command and Control
Privilege Escalation