PwC安全技术小组
Ctrlk
  • PwC安全技术小组须知
  • 技术
    • 技术 - Web安全测试技术点
    • 技术 - 安全开发知识库
    • 技术 - 红队攻击手段介绍
      • offensive-security-experiments
      • offensive-security
        • Red Team Infrastructure
        • Initial Access
        • Code Execution
        • Code & Process Injection
        • Defense Evasion
        • Enumeration and Discovery
        • Privilege Escalation
        • Credential Access & Dumping
        • Lateral Movement
        • Persistence
        • Exfiltration
      • miscellaneous-reversing-forensics
  • 工具
    • 工具 - BloodHound基础使用
    • 工具 - CobaltStrike基础使用
由 GitBook 提供支持
在本页

这有帮助吗?

  1. 技术
  2. 技术 - 红队攻击手段介绍
  3. offensive-security

Code Execution

Here are the articles in this section:regsvr32regsvr32 (squiblydoo) code execution - bypass application whitelisting.MSHTAMSHTA code execution - bypass application whitelisting.Control Panel ItemControl Panel Item code execution - bypass application whitelisting.Executing Code as a Control Panel Item through an Exported Cplapplet FunctionCode Execution through Control Panel Add-insCMSTPCMSTP code execution - bypass application whitelisting.InstallUtilInstallUtil code execution - bypass application whitelisting.Using MSBuild to Execute Shellcode in C#Forfiles Indirect Command ExecutionDefense EvasionApplication Whitelisting Bypass with WMIC and XSLPowershell Without Powershell.exePowershell Constrained Language Mode ByPassUnderstanding ConstrainedLanguageModeForcing Iexplore.exe to Load a Malicious DLL via COM Abusepubprn.vbs Signed Script Code ExecutionSigned Script Proxy Execution - bypass application whitelisting using pubprn.vbsBinary Exploitation

上一页Initial Access下一页Code & Process Injection

最后更新于4年前

这有帮助吗?