unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
MimiKatz for Pentester: Kerberos
This write-up will be part of a series of articles on the tool called Mimikatz which was cre...
2022-7-12 00:51:29 | 阅读: 37 |
收藏
|
www.hackingarticles.in
client
kirbi
ccache
mimikatz
ignite
Caldera: Red Team Emulation (Part 1)
This article aims to demonstrate an open-source breach & emulation framework through which r...
2022-6-17 01:57:44 | 阅读: 128 |
收藏
|
www.hackingarticles.in
caldera
agents
emulation
ttps
abilities
Domain Escalation: Unconstrained Delegation
IntroductionPost-Windows 2000, Microsoft introduced an option where users could authenticat...
2022-5-29 03:41:16 | 阅读: 41 |
收藏
|
www.hackingarticles.in
delegation
rubeus
dc1
attacker
Domain Persistence: Silver Ticket Attack
IntroductionBenjamin Delpy (the creator of mimikatz) introduced the silver ticket attack in Blackh...
2022-5-15 01:23:59 | 阅读: 64 |
收藏
|
www.hackingarticles.in
silver
ignite
rubeus
machine
dc1
A Detailed Guide on Rubeus
IntroductionRubeus is a C# toolkit for Kerberos interaction and abuses. Kerberos, as we all know,...
2022-5-12 02:26:52 | 阅读: 178 |
收藏
|
www.hackingarticles.in
rubeus
ignite
dc1
Process Herpaderping (Mitre:T1055)
IntroductionJohnny Shaw demonstrated a defense evasion technique known as process herpaderp...
2022-4-25 01:40:13 | 阅读: 44 |
收藏
|
www.hackingarticles.in
payload
mapped
inspection
injection
A Detailed Guide on Hydra
Hello! Pentesters, this article is about a brute-forcing tool Hydra. Hydra is one of the favourite...
2022-4-23 02:30:28 | 阅读: 162 |
收藏
|
www.hackingarticles.in
hydra
username
proxy
ignite
passwords
A Detailed Guide on HTML Smuggling
IntroductionHTML Smuggling is an evasive payload delivery method that helps an attacker smuggle pa...
2022-4-20 02:3:28 | 阅读: 32 |
收藏
|
www.hackingarticles.in
payload
download
victim
blobs
anchor
A Detailed Guide on Medusa
Hi Pentesters! Let’s learn about a different tool Medusa, which is intended to be a speedy, paralle...
2022-4-16 02:7:0 | 阅读: 32 |
收藏
|
www.hackingarticles.in
medusa
username
ignite
logins
Process Doppelganging (Mitre:T1055.013)
IntroductionEugene Kogan and Tal Liberman presented a technique for defense evasion called...
2022-4-15 01:43:9 | 阅读: 21 |
收藏
|
www.hackingarticles.in
memory
windows
payload
dummy
Process Hollowing (Mitre:T1055.012)
IntroductionIn July 2011, John Leitch of autosectools.com talked about a technique he called proce...
2022-4-13 02:5:5 | 阅读: 20 |
收藏
|
www.hackingarticles.in
memory
hollowing
suspended
ppeb
Defense Evasion: Process Hollowing (Mitre:T1055.012)
IntroductionIn July 2011, John Leitch of autosectools.com talked about a technique he called proce...
2022-4-13 02:5:5 | 阅读: 38 |
收藏
|
www.hackingarticles.in
memory
hollowing
suspended
A Detailed Guide on AMSI Bypass
IntroductionWindows developed the Antimalware Scan Interface (AMSI) standard that allows a develop...
2022-4-12 04:27:32 | 阅读: 79 |
收藏
|
www.hackingarticles.in
bypass
powershell
mimikatz
memory
windows
A Detailed Guide on Responder (LLMNR Poisoning)
IntroductionResponder is a widely used tool in penetration test scenarios and can be used for late...
2022-4-10 00:57:55 | 阅读: 174 |
收藏
|
www.hackingarticles.in
responder
llmnr
victim
dhcp
wpad
A Detailed Guide on Cewl
Hi, Pentesters! In this article, we are going to focus on the Kali Linux tool “Cewl” which will bas...
2022-4-8 01:50:31 | 阅读: 52 |
收藏
|
www.hackingarticles.in
cewl
proxy
vulnweb
lowercase
Windows Persistence: COM Hijacking (MITRE: T1546.015)
IntroductionAccording to MITRE, “Adversaries can use the COM system to insert malicious code that...
2022-4-6 17:30:11 | 阅读: 33 |
收藏
|
www.hackingarticles.in
clsid
software
microsoft
machine
Lateral Movement: Remote Services (Mitre:T1021)
IntroductionDuring Red Team assessments, after a compromise has been done, attackers tend to later...
2022-3-28 00:29:50 | 阅读: 50 |
收藏
|
www.hackingarticles.in
remote
lateral
windows
t1021
powershell
Lateral Movement: WebClient Workstation Takeover
IntroductionThe article is based on @tifkin_’s idea that a workstation takeover, also known as lat...
2022-3-25 01:42:9 | 阅读: 38 |
收藏
|
www.hackingarticles.in
responder
webdav
petitpotam
machine
delegation
A Detailed Guide on Crunch
IntroductionOften times attackers have the need to generate a wordlist based on certain criteria w...
2022-3-24 02:26:47 | 阅读: 29 |
收藏
|
www.hackingarticles.in
crunch
lowercase
alphabets
raj
Parent PID Spoofing (Mitre:T1134)
IntroductionParent PID spoofing is an access token manipulation technique that may aid an attacker...
2022-3-20 02:34:57 | 阅读: 46 |
收藏
|
www.hackingarticles.in
spoofing
powershell
windows
reverse
msfvenom
Previous
3
4
5
6
7
8
9
10
Next