Explotacion
Técnicas de Explotación y Movimiento:
Weaponization
Custom Executables
Blending In
Execution Guardrails
Initial Access
Network Propagation
Discovery
Operational Security
Deception Technology
Local Network Enumeration
Local Privilege Escalation
Password Cracking
Persistence
Active Directory Attacks and Lateral Movement
Introduction to Active Directory
Trees and Forests
Authentication, Authorization, Access Tokens
AD Enumerate
DNS Extraction
Domain Privilege Escalation
Access Token Manipulation
Pass-The-Hash, Pass-The-Ticket
Kerberoasting
Silver Ticket, Golden Ticket, Skeleton Key
AD Certificate Services
Unconstrained and Constrained Delegation
Coerced Authentication Using PrinterBug and PetitPotam
Hopping the Trust
LLMNR/NBNS/WPAD
Bloodhound/SharpHound
AD Explorer
SMB Pipes, Remote Desktop Protocol, PsExec, Windows Management Instrumentation, dcom
SMB Relay
LLMNR/NBT-NS Poisoning and Relay
Responder
Setting Up Shadow Credentials
Domain Privilege Abuse
DC Sync
Domain Lateral Movement, Domain Trust Attacks
Pivoting Between Domains and Forests
Forest Enumeration, Forest Attacks
Obtaining the Objective and Reporting
Action on Objectives
Database Attacks
SQL Abuse
Trust Abuse
PowerupSQL
Target Manipulation
Collection
Data Staging
Exfiltration
Impact
Emulating Ransomware
Última actualización