DLL Injection

Injecting DLL’s into remote processes.

Interacting with Foreign Handlers

Writing stagers to interact with foreign C2 frameworks.

Metasploit

A Metasploit command reference.

Active Directory Schema Modification

Changing default security descriptor properties to escalate from a child to parent domain.

Exploiting Tomcat

Exploiting common Tomcat vulnerabilities.

Configuring Kali

Adding additional security auditing tools to Kali.

Attacking MSSQL

Compromising MSSQL databases, and escalating privileges.

Golden gMSA Attacks

Extracting gMSA service accounts from child domains.

SID History Abuse

Modifying SID History values to compromise parent domains.

Backup Operator Privilege Escalation

Extracting domain controller credentials using the Backup Operators group.

Active Directory Explorer

Using Microsoft AD Explorer to collect Active Directory attack path information.

Active Directory DACL Attacks

Exploiting misconfigured Active Directory access control lists.