bars
Red Team Notes
search
circle-xmark
Ctrl
k
copy
Copy
chevron-down
offensive security
Privilege Escalation
Primary Access Token Manipulation
chevron-right
Windows NamedPipes 101 + Privilege Escalation
chevron-right
DLL Hijacking
chevron-right
WebShells
chevron-right
Image File Execution Options Injection
chevron-right
Unquoted Service Paths
chevron-right
Pass The Hash: Privilege Escalation with Invoke-WMIExec
chevron-right
Environment Variable $Path Interception
chevron-right
Weak Service Permissions
chevron-right
Previous
Detecting Sysmon on the Victim Host
chevron-left
Next
Primary Access Token Manipulation
chevron-right