CVE Description MITRE CVE-2022-21900 Windows AD Elevation of Privilege Link CVE-2022-21884 AD Certificate Services Spoofing Link CVE-2022-21876 Windows AD Elevation of Privilege Link CVE-2022-21853 Netlogon Elevation of Privilege Link CVE-2022-21844 Windows AD Elevation of Privilege Link CVE-2021-40444 MSHTML Remote Code Execution Link CVE-2021-36968 Windows SMB…
What is the Subject Alternative Name (SAN)? Arbitrary Subject Alternative Name (SAN) vulnerability is a security concern related to the X.509 certificate standard used in the Transport Layer Security (TLS) protocol. The Subject Alternative Name field in a certificate allows multiple hostnames to be associated…
1. AVET – Anti Virus Evasion Tool Post-process exploits containing executable files targeted for Windows machines to avoid being recognized by antivirus software. 2. CarbonCopy Tool that creates a spoofed certificate of any online website and signs an Executable for AV evasion. 3. Hyperion Runtime…
List all SPN Accounts Requesting a Single TGS ticket Cracking the Ticket Offline with Hashcat
Find existing local admin access for the current user: Hunt for sessions of interesting users on machines where you have access: Search for kerberoastable users: Search for AS-REP roastable users: Look for interesting ACLs within the domain, filtering on a specific user or group you…
A comprehensive guide to understanding the bypass AMSI feature to skirting Microsoft’s built-in antimalware scan interface. Get an in-depth look at what the feature is and how it’s used to prevent malware from executing through scripting languages, allowing for a more secure experience. Learn the…
Port forwarding using Netsh is a simple process that allows you to remotely access a computer or network from another device. With a few simple commands, you can route traffic from one application to another, and even control how data is sent over the network….
Dive into the world of Active Directory default policies and learn how to leverage them to fortify your network’s security. Discover key policies, their significance, and how they contribute to an efficient and protected Active Directory environment. Active Directory, Microsoft’s directory service, plays a vital…
Dive deep into the PetitPotam vulnerability, an NTLM relay attack targeting Windows servers. This article provides a detailed analysis of …