✍️
Red Teaming Experiments
Ctrlk
  • What is this iRed.team?
  • Pinned
    • Pentesting Cheatsheets
    • Active Directory & Kerberos Abuse
  • offensive security
    • Red Team Infrastructure
    • Initial Access
      • Password Spraying Outlook Web Access: Remote Shell
      • Phishing with MS Office
      • Phishing with GoPhish and DigitalOcean
      • Forced Authentication
      • NetNTLMv2 hash stealing using Outlook
    • Code Execution
    • Code & Process Injection
    • Defense Evasion
    • Enumeration and Discovery
    • Privilege Escalation
    • Credential Access & Dumping
    • Lateral Movement
    • Persistence
    • Exfiltration
  • reversing, forensics & misc
    • Windows Internals
    • Cloud
    • Neo4j
    • Dump Virtual Box Memory
    • AES Encryption Using Crypto++ .lib in Visual Studio C++
    • Reversing Password Checking Routine
Powered by GitBook
On this page

Was this helpful?

  1. offensive security

Initial Access

Password Spraying Outlook Web Access: Remote ShellPhishing with MS OfficePhishing with GoPhish and DigitalOceanForced AuthenticationNetNTLMv2 hash stealing using Outlook
PreviousSpiderfoot 101 with Kali using DockerNextPassword Spraying Outlook Web Access: Remote Shell

Last updated 4 years ago

Was this helpful?