~/xLe0x/notes

🕵 whoami 🗃 notes 📬 contact 🎮 challenges
🕵 whoami 🗃 notes 📬 contact 🎮 challenges
~/notes
ASReproasting DCShadow Attack DCSync Attack GPP Attack IPv6 Attack Kerberoasting LLMNR Poisoning Pass the Password / Pass the Hash Silver and Golden Ticket Attacks SMB Relay Token Impersonation URL File Attacks
Mimikatz
BloodHound on Kali Linux Enumeration without credentials
Cap
1.1 Launching Powershell 1.2 Powershell Cmdlets
2.1 Creating Users and Computers 2.2 Joining a Computer & Removing a Computer from a Domain 2.3 Renaming a Computer 2.4 Resetting a Computer Account 2.5 Disabling User and Computer Accounts 2.6 Deleting a Computer from Active Directory 2.7 Creating and Deleting an Active Directory Group 2.8 Adding Users and Computers to a Group 2.9 Removing Users and Computers from a Group 2.99 Moving Users and Computers to a New Organizational Unit
3.1 Viewing Objects in a Directory 3.2 Creating Files and Folders 3.3 Deleting Files and Folders 3.4 Copying Files and Folders 3.5 Moving Files and Directories 3.6 Renaming Files 3.7 Setting File and Folder Permissions 3.8 Removing User Permissions 3.9 Enabling and Disabling Permissions Inheritance 3.99 Changing File and Folder Ownership
4.1 Creating Scheduled Tasks with PowerShell Scripts 4.2 Running PowerShell Scripts with Task Scheduler
Bookstore
Enumeration
Abuse Privileges - AlwaysInstallElevated Abuse Privileges - SeBackupPrivilege Abuse Privileges - SeImpersonatePrivilege Exploiting Scheduled Tasks Registry - Exploiting AutoRuns Registry - Passwords Service Exploits - Insecure Service Permissions Service Exploits - Unquoted Service Path Service Exploits - Writable Service Executable StartUp Apps Stored Credentials & Password Hunting

Security Notes

Active Directory Hacking

Explore Active Directory Hacking concepts, techniques, and best practices.

Browse section

Hack The Box

Explore Hack The Box concepts, techniques, and best practices.

Browse section

Powershell

Explore Powershell concepts, techniques, and best practices.

Browse section

Try Hack Me

Explore Try Hack Me concepts, techniques, and best practices.

Browse section

Windows Privilege Escalation

Explore Windows Privilege Escalation concepts, techniques, and best practices.

Browse section

© 2024 Ammar Mohamed Saber. All rights reserved.