Red Team Notes
search
Ctrlk
  • What is ired.team notes?
  • Pinned
    • Pentesting Cheatsheetschevron-right
    • Active Directory & Kerberos Abusechevron-right
  • offensive security
    • Red Team Infrastructurechevron-right
    • Initial Accesschevron-right
    • Code Executionchevron-right
    • Code & Process Injectionchevron-right
    • Defense Evasionchevron-right
    • Enumeration and Discoverychevron-right
    • Privilege Escalationchevron-right
      • Primary Access Token Manipulation
      • Windows NamedPipes 101 + Privilege Escalation
      • DLL Hijacking
      • WebShells
      • Image File Execution Options Injection
      • Unquoted Service Paths
      • Pass The Hash: Privilege Escalation with Invoke-WMIExec
      • Environment Variable $Path Interception
      • Weak Service Permissions
    • Credential Access & Dumpingchevron-right
    • Lateral Movementchevron-right
    • Persistencechevron-right
    • Exfiltrationchevron-right
  • reversing, forensics & misc
    • Internalschevron-right
    • Cloudchevron-right
    • Neo4j
    • Dump Virtual Box Memory
    • AES Encryption Using Crypto++ .lib in Visual Studio C++
    • Reversing Password Checking Routine
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. offensive security

Privilege Escalation

Primary Access Token Manipulationchevron-rightWindows NamedPipes 101 + Privilege Escalationchevron-rightDLL Hijackingchevron-rightWebShellschevron-rightImage File Execution Options Injectionchevron-rightUnquoted Service Pathschevron-rightPass The Hash: Privilege Escalation with Invoke-WMIExecchevron-rightEnvironment Variable $Path Interceptionchevron-rightWeak Service Permissionschevron-right
PreviousDetecting Sysmon on the Victim Hostchevron-leftNextPrimary Access Token Manipulationchevron-right