Web Browser Stored Credentials
Penetration Testing Lab Blog
by Administrator
5M ago
Microsoft introduced Data Protection Application Programming Interface (DPAPI) in Windows environments as a method to encrypt and decrypt sensitive data such as credentials using the ..read more
Visit website
Persistence – DLL Proxy Loading
Penetration Testing Lab Blog
by Administrator
10M ago
DLL Proxy Loading is a technique which an arbitrary DLL exports the same functions as the legitimate DLL and forwards the calls to the legitimate ..read more
Visit website
Persistence – Explorer
Penetration Testing Lab Blog
by Administrator
11M ago
Windows File Explorer is the is the graphical file management utility for the Windows operating system and the default desktop environment. Windows explorer was introduced ..read more
Visit website
Persistence – Visual Studio Code Extensions
Penetration Testing Lab Blog
by Administrator
11M ago
It is not uncommon developers or users responsible to write code (i.e. detection engineers using Sigma) to utilize Visual Studio Code as their code editor ..read more
Visit website
AS-REP Roasting
Penetration Testing Lab Blog
by Administrator
11M ago
Active Directory users that have the Kerberos pre-authentication enabled and require access to a resource initiate the Kerberos authentication process by sending an Authentication Server ..read more
Visit website
Persistence – Windows Setup Script
Penetration Testing Lab Blog
by Administrator
1y ago
When the Windows Operating system is installed via a clean installation or via an upgrade, the Windows Setup binary is executed. The Windows setup allows ..read more
Visit website
Persistence – Disk Clean-up
Penetration Testing Lab Blog
by Administrator
1y ago
Disk Clean-up is a utility which is part of Windows operating systems and can free up hard drive disk space by deleting mainly cache and ..read more
Visit website
Domain Escalation – Backup Operator
Penetration Testing Lab Blog
by Administrator
1y ago
The Backup Operators is a Windows built-in group. Users which are part of this group have permissions to perform backup and restore operations. More specifically ..read more
Visit website
Lateral Movement – Visual Studio DTE
Penetration Testing Lab Blog
by Administrator
1y ago
A lot of organizations have some sort of application development program and it is highly likely that developers will utilize Visual Studio for their development ..read more
Visit website
Persistence – Event Log
Penetration Testing Lab Blog
by Administrator
1y ago
Windows Event logs are the main source of information for defensive security teams to identify threats and for administrators to troubleshoot errors. The logs are ..read more
Visit website

Follow Penetration Testing Lab Blog on FeedSpot

Continue with Google
Continue with Apple
OR