Enumeration and Discovery
What is ired.team?
Pinned
Active Directory & Kerberos Abuse
offensive security
Windows Event IDs and Others for Situational Awareness
Enumerating COM Objects and their Methods
Enumerating Users without net, Services without sc and Scheduled Tasks without schtasks
Enumerating Windows Domains with rpcclient through SocksProxy == Bypassing Command Line Logging
Account Discovery & Enumeration
Using COM to Enumerate Hostname, Username, Domain, Network Drives
Detecting Sysmon on the Victim Host
reversing, forensics & misc
AES Encryption Using Crypto++ .lib in Visual Studio C++
Reversing Password Checking RoutinePowered by GitBook
Enumeration and Discovery
Here are the articles in this section:Windows Event IDs and Others for Situational AwarenessEnumerating COM Objects and their MethodsEnumerating Users without net, Services without sc and Scheduled Tasks without schtasksEnumerating Windows Domains with rpcclient through SocksProxy == Bypassing Command Line LoggingDump GAL from OWAApplication Window DiscoveryDiscoveryAccount Discovery & EnumerationDiscoveryUsing COM to Enumerate Hostname, Username, Domain, Network DrivesDetecting Sysmon on the Victim HostExploring ways to detect Sysmon presence on the victim systemPreviousExecuting C# Assemblies from Jscript and wscript with DotNetToJscriptNextWindows Event IDs and Others for Situational Awareness
Last updated 2 years ago
最后更新于
这有帮助吗?