Red Team Notes
CtrlK
  • What is ired.team notes?
  • Pinned
    • Pentesting Cheatsheets
    • Active Directory & Kerberos Abuse
  • offensive security
    • Red Team Infrastructure
    • Initial Access
    • Code Execution
    • Code & Process Injection
    • Defense Evasion
    • Enumeration and Discovery
      • Windows Event IDs and Others for Situational Awareness
      • Enumerating COM Objects and their Methods
      • Enumerating Users without net, Services without sc and Scheduled Tasks without schtasks
      • Enumerating Windows Domains with rpcclient through SocksProxy == Bypassing Command Line Logging
      • Dump Global Address List (GAL) from OWA
      • Application Window Discovery
      • Account Discovery & Enumeration
      • Using COM to Enumerate Hostname, Username, Domain, Network Drives
      • Detecting Sysmon on the Victim Host
    • Privilege Escalation
    • Credential Access & Dumping
    • Lateral Movement
    • Persistence
    • Exfiltration
  • reversing, forensics & misc
    • Internals
    • Cloud
    • Neo4j
    • Dump Virtual Box Memory
    • AES Encryption Using Crypto++ .lib in Visual Studio C++
    • Reversing Password Checking Routine
Powered by GitBook
On this page
  1. offensive security

Enumeration and Discovery

Windows Event IDs and Others for Situational AwarenessEnumerating COM Objects and their MethodsEnumerating Users without net, Services without sc and Scheduled Tasks without schtasksEnumerating Windows Domains with rpcclient through SocksProxy == Bypassing Command Line LoggingDump Global Address List (GAL) from OWAApplication Window DiscoveryAccount Discovery & EnumerationUsing COM to Enumerate Hostname, Username, Domain, Network DrivesDetecting Sysmon on the Victim Host
PreviousExecuting C# Assemblies from Jscript and wscript with DotNetToJscriptNextWindows Event IDs and Others for Situational Awareness