red team 54
- [AD CS] User & Computer Persistence
- [AD CS] NTLM Relaying to ADCS HTTP Endpoints
- [AD CS] Misconfigured Certificate Template Exploit
- [AD CS] 01 - Introduction
- [Kerberos] Shadow Credentials
- [Kerberos] Resource-Based Constrained Delegation (RBCD)
- [Kerberos] S4U2Self Abuse
- [Kerberos] Constrained Delegation
- [Kerberos] Unconstrained Delegation
- [Kerberos] 01 - Introduction
- 01 - Introduction to Domain Reconnaissance
- [Credential Theft] Domain Cache Credentials
- [Credential Theft] Security Account Manager
- [Credential Theft] NTLM Hashes
- [Credential Theft] Kerberos Encryption Keys
- [Credential Theft] Extracting Kerberos Tickets
- 01 - Introduction to User Impersonation
- [Credential Theft] 01 - Introduction
- Persistence via WMI Event Subscriptions
- Persistence via Windows Services
- Persistence via Registry AutoRun
- Persistence via Startup Folder
- Persistence via Task Scheduler
- [Misconfig] Weak Service Binary Permissions
- [Misconfig] UAC Bypass
- [Misconfig] Weak Service Permissions
- [Misconfig] What is Windows Service?
- 01 - Introduction to Windows Persistence
- 01 - Introduction to Windows Privilege Escalation
- [Windows] User Sessions
- [Windows] Clipboard
- [Windows] Keyloggers
- [Windows] Screenshots
- [Windows] Seatbelt
- [Windows] Processes
- 01 - Windows Host Reconnaissance
- 03 - [Phishing] HTML Smuggling
- 03 - [MS Office - Word] Remote Template Injection
- 02 - [Phishing] Office365 Phishing Templates
- 01 - Introduction to Social Engineering
- 02 - [MS Office - Word] VBA Macro
- 01 - Introduction to Malware Development
- 02 - Attacking Login Portals
- 01 - Initial Access
- 01 - Introduction to External Reconnaissance
- 01 - Introduction to C2
- 02 - Cobalt Strike
- 04 - Red Team Report Template
- 03 - Red Team Engagement Planning
- 01 - Introduction to Red Teaming
- 02 - What is Red Teaming?
- [Misconfig] Unquoted Service Paths
- [Kerberos] Kerberoasting
- [Kerberos] AS-REP Roasting