✍️
Red Teaming Experiments
Ctrlk
  • What is this iRed.team?
  • Pinned
    • Pentesting Cheatsheets
    • Active Directory & Kerberos Abuse
  • offensive security
    • Red Team Infrastructure
    • Initial Access
    • Code Execution
    • Code & Process Injection
    • Defense Evasion
    • Enumeration and Discovery
      • Windows Event IDs and Others for Situational Awareness
      • Enumerating COM Objects and their Methods
      • Enumerating Users without net, Services without sc and Scheduled Tasks without schtasks
      • Enumerating Windows Domains with rpcclient through SocksProxy == Bypassing Command Line Logging
      • Dump GAL from OWA
      • T1010: Application Window Discovery
      • T1087: Account Discovery & Enumeration
      • Using COM to Enumerate Hostname, Username, Domain, Network Drives
      • Detecting Sysmon on the Victim Host
    • Privilege Escalation
    • Credential Access & Dumping
    • Lateral Movement
    • Persistence
    • Exfiltration
  • reversing, forensics & misc
    • Windows Internals
    • Cloud
    • Neo4j
    • Dump Virtual Box Memory
    • AES Encryption Using Crypto++ .lib in Visual Studio C++
    • Reversing Password Checking Routine
Powered by GitBook
On this page

Was this helpful?

  1. offensive security

Enumeration and Discovery

Windows Event IDs and Others for Situational AwarenessEnumerating COM Objects and their MethodsEnumerating Users without net, Services without sc and Scheduled Tasks without schtasksEnumerating Windows Domains with rpcclient through SocksProxy == Bypassing Command Line LoggingDump GAL from OWAT1010: Application Window DiscoveryT1087: Account Discovery & EnumerationUsing COM to Enumerate Hostname, Username, Domain, Network DrivesDetecting Sysmon on the Victim Host
PreviousExecuting C# Assemblies from Jscript and wscript with DotNetToJscriptNextWindows Event IDs and Others for Situational Awareness

Last updated 4 years ago

Was this helpful?