mirror of
https://github.com/pe3zx/my-infosec-awesome.git
synced 2025-01-10 15:19:28 -05:00
Articles: Post Exploitation: Evading Microsoft's Autoruns
This commit is contained in:
parent
06f04d61a9
commit
b5b33e0621
@ -467,6 +467,9 @@ _return-to-libc techniques_
|
||||
|
||||
#### Post Exploitation Platform: Windows
|
||||
|
||||
- [Evading Microsoft’s AutoRuns](https://blog.conscioushacker.io/index.php/2017/10/25/evading-microsofts-autoruns/)
|
||||
- **Extension search order hijacking**: Manipulate extension search order which `.COM` has been looked for first before `.EXE` by making the actual `.EXE` disappeared and place dummy `.COM` with the same name as `.EXE` on the same directory
|
||||
- **PowerShell injection vulnerability**: Use `SyncAppvPublishingServer.exe` to execute powershell cmdlet e.g. `SyncAppvPublishingServer.exe ".; Start-Process calc.exe`
|
||||
- [Post Exploitation Using NetNTLM Downgrade Attacks](https://www.optiv.com/blog/post-exploitation-using-netntlm-downgrade-attacks)
|
||||
- [Top Five Ways I Got Domain Admin on Your Internal Network before Lunch (2018 Edition)](https://medium.com/@adam.toscher/top-five-ways-i-got-domain-admin-on-your-internal-network-before-lunch-2018-edition-82259ab73aaa)
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user