Red Team Notes
search
⌘Ctrlk
Red Team Notes
  • What is ired.team notes?
  • Pinned
    • Pentesting Cheatsheets
    • Active Directory & Kerberos Abuse
  • offensive security
    • Red Team Infrastructure
    • Initial Access
    • Code Execution
    • Code & Process Injection
    • Defense Evasion
    • Enumeration and Discovery
    • Privilege Escalation
    • Credential Access & Dumping
    • Lateral Movement
    • Persistence
    • Exfiltration
  • reversing, forensics & misc
    • Internals
      • Configuring Kernel Debugging Environment with kdnet and WinDBG Preview
      • Compiling a Simple Kernel Driver, DbgPrint, DbgView
      • Loading Windows Kernel Driver for Debugging
      • Subscribing to Process Creation, Thread Creation and Image Load Notifications from a Kernel Driver
      • Listing Open Handles and Finding Kernel Object Addresses
      • Sending Commands From Your Userland Program to Your Kernel Driver using IOCTL
      • Windows Kernel Drivers 101
      • Windows x64 Calling Convention: Stack Frame
      • Linux x64 Calling Convention: Stack Frame
      • System Service Descriptor Table - SSDT
      • Interrupt Descriptor Table - IDT
      • Token Abuse for Privilege Escalation in Kernel
      • Manipulating ActiveProcessLinks to Hide Processes in Userland
      • ETW: Event Tracing for Windows 101
      • Exploring Injected Threads
      • Parsing PE File Headers with C++
      • Instrumenting Windows APIs with Frida
      • Exploring Process Environment Block
      • Writing a Custom Bootloader
    • Cloud
    • Neo4j
    • Dump Virtual Box Memory
    • AES Encryption Using Crypto++ .lib in Visual Studio C++
    • Reversing Password Checking Routine
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. reversing, forensics & misc

Internals

Configuring Kernel Debugging Environment with kdnet and WinDBG Previewchevron-rightCompiling a Simple Kernel Driver, DbgPrint, DbgViewchevron-rightLoading Windows Kernel Driver for Debuggingchevron-rightSubscribing to Process Creation, Thread Creation and Image Load Notifications from a Kernel Driverchevron-rightListing Open Handles and Finding Kernel Object Addresseschevron-rightSending Commands From Your Userland Program to Your Kernel Driver using IOCTLchevron-rightWindows Kernel Drivers 101chevron-rightWindows x64 Calling Convention: Stack Framechevron-rightLinux x64 Calling Convention: Stack Framechevron-rightSystem Service Descriptor Table - SSDTchevron-rightInterrupt Descriptor Table - IDTchevron-rightToken Abuse for Privilege Escalation in Kernelchevron-rightManipulating ActiveProcessLinks to Hide Processes in Userlandchevron-rightETW: Event Tracing for Windows 101chevron-rightExploring Injected Threadschevron-rightParsing PE File Headers with C++chevron-rightInstrumenting Windows APIs with Fridachevron-rightExploring Process Environment Blockchevron-rightWriting a Custom Bootloaderchevron-right
PreviousPowershell Payload Delivery via DNS using Invoke-PowerCloudchevron-leftNextConfiguring Kernel Debugging Environment with kdnet and WinDBG Previewchevron-right