Red Team Notes
Search...
Ctrl + K
offensive security
Privilege Escalation
Primary Access Token Manipulation
Windows NamedPipes 101 + Privilege Escalation
DLL Hijacking
WebShells
Image File Execution Options Injection
Unquoted Service Paths
Pass The Hash: Privilege Escalation with Invoke-WMIExec
Environment Variable $Path Interception
Weak Service Permissions
Previous
Detecting Sysmon on the Victim Host
Next
Primary Access Token Manipulation