Enumeration and Discovery

What is ired.team?

Pinned

Pentesting Cheatsheets

Active Directory & Kerberos Abuse

offensive security

Red Team Infrastructure

Initial Access

Code Execution

Code & Process Injection

Defense Evasion

Enumeration and Discovery

Windows Event IDs and Others for Situational Awareness

Enumerating COM Objects and their Methods

Enumerating Users without net, Services without sc and Scheduled Tasks without schtasks

Enumerating Windows Domains with rpcclient through SocksProxy == Bypassing Command Line Logging

Dump GAL from OWA

Application Window Discovery

Account Discovery & Enumeration

Using COM to Enumerate Hostname, Username, Domain, Network Drives

Detecting Sysmon on the Victim Host

Privilege Escalation

Credential Access & Dumping

Lateral Movement

Persistence

Exfiltration

reversing, forensics & misc

Windows / OS Internals

Cloud

Neo4j

Dump Virtual Box Memory

AES Encryption Using Crypto++ .lib in Visual Studio C++

Reversing Password Checking RoutinePowered by GitBook

Enumeration and Discovery

Here are the articles in this section:Windows Event IDs and Others for Situational AwarenessEnumerating COM Objects and their MethodsEnumerating Users without net, Services without sc and Scheduled Tasks without schtasksEnumerating Windows Domains with rpcclient through SocksProxy == Bypassing Command Line LoggingDump GAL from OWAApplication Window DiscoveryDiscoveryAccount Discovery & EnumerationDiscoveryUsing COM to Enumerate Hostname, Username, Domain, Network DrivesDetecting Sysmon on the Victim HostExploring ways to detect Sysmon presence on the victim systemPreviousExecuting C# Assemblies from Jscript and wscript with DotNetToJscriptNextWindows Event IDs and Others for Situational Awareness

Last updated 2 years ago

最后更新于

这有帮助吗?