During this engagement, I reached Domain Admin privileges in 6 different ways. In this blog post, however, I will walk you through one of the most interesting ways of the 6 rather than going through all of them.
Unlock the secrets of a foolproof penetration testing plan with our comprehensive guide. Learn the essential elements for guaranteed success.
The plan was to run sharphound.exe with the method -c a because why not? Let’s wake up the analysts in the SoC and bring enough coffee for the whole team, otherwise this could get really messy ...
Weaponizing RDP files for phishing and initial access. Based on the work of Mike Felch on Rouge RDP technique.
In this blog post, we will explore the importance of SMB signing and the dangers of NTLM relay attacks. By understanding these concepts, organizations can better secure their networks and protect themselves against potential threats.
Let me first start by saying I will not be revealing in this post any novel techniques or new research that hasn’t been seen before. I will, however, reveal my own methodology when it comes to finding gaps in EDRs visibility in order to bypass detection.
Enter your email address to receive cyber security tips, techniques, and updates
powered by nextbracket.io