h1
Lab of a Penetration Tester
h2
Friday, August 23, 2019
h2
Tuesday, October 16, 2018
h2
Thursday, April 18, 2019
h2
My upcoming Trainings/Talks
h2
Online Labs and Courses
h2
Wednesday, October 31, 2018
h3
Using ActiveDirectory module for Domain Enumeration from PowerShell Constrained Language Mode
h3
How NOT to use the PAM trust - Leveraging Shadow Principals for Cross Forest Attacks
h3
Forging Trusts for Deception in Active Directory
h3
RACE - Minimal Rights and ACE for Active Directory Dominance
h4
About Windows Access Control Model:
h4
Introducing the RACE toolkit
h4
Persistence - PowerShell Remoting
h4
On-demand Privilege Escalation - Windows Services
h4
On-demand Privilege Escalation - Registry Autoruns
h4
On demand Privilege Escalation - Just Enough Administration (JEA)
h4
Persistence - Registry
h4
On demand Privilege Escalation on DC - DNSAdmins
h4
On demand Privilege Escalation on DC - DSRM Administrator
h4
Persistence using DC - Resource-based Constrained Delegation (RBCD)
h4
Persistence using DC - Exchange Groups
h4
The attacker psychology
h4
Desired properties of a decoy
h4
Introducing Deploy-Deception
h4
Enumeration - Decoy User Objects
h4
Enumeration - Decoy Computer Objects
h4
Enumeration - Decoy Group Objects
h4
Enumeration and Lateral Movement - Privileged Decoy User Objects
h4
Enumeration - Domain and Forest Trust objects
h4
Red Team Revenge - Identifying Deception
h4
Red Team Revenge - Avoiding Deception
h4
Blue Teams - Avoiding identification
h4
Future Work and Community Involvement
h4
Is PAM trust bad? Should I stop using a bastion forest? Why is Microsoft so evil? What is the meani