Explore >> Select a destination


You are here

diverto.github.io
| | adsecurity.org
5.3 parsecs away

Travel
| | [AI summary] This technical article details essential security features in PowerShell version 5, including script block logging, system-wide transcripts, constrained mode, and Antimalware Scan Interface (AMSI) integration to defend against enterprise attacks.
| | corelight.com
5.4 parsecs away

Travel
| | Learn how network visibility and detection are critical to closing security gaps and detecting these attacks.
| | www.securitynik.com
4.5 parsecs away

Travel
| | In this 5 part series, I'm learning more about Powershell Empire from the perspectives of using the tool, analyzing the logs which gets crea...
| | 0xdf.gitlab.io
18.3 parsecs away

Travel
| I loved Sizzle. It was just a really tough box that reinforced Windows concepts that I hear about from pentesters in the real world. I'll start with some SMB access, use a .scf file to capture a users NetNTLM hash, and crack it to get creds. From there I can create a certificate for the user and then authenticate over WinRM. I'll Kerberoast to get a second user, who is able to run the DCSync attack, leading to an admin shell. I'll have two beyond root sections, the first to show two unintended paths, and the second to exploit NTLM authentication over HTTP, and how Burp breaks it.