Red Team Notes
CtrlK
  • What is ired.team notes?
  • Pinned
    • Pentesting Cheatsheets
    • Active Directory & Kerberos Abuse
  • offensive security
    • Red Team Infrastructure
    • Initial Access
    • Code Execution
    • Code & Process Injection
    • Defense Evasion
    • Enumeration and Discovery
    • Privilege Escalation
      • Primary Access Token Manipulation
      • Windows NamedPipes 101 + Privilege Escalation
      • DLL Hijacking
      • WebShells
      • Image File Execution Options Injection
      • Unquoted Service Paths
      • Pass The Hash: Privilege Escalation with Invoke-WMIExec
      • Environment Variable $Path Interception
      • Weak Service Permissions
    • Credential Access & Dumping
    • Lateral Movement
    • Persistence
    • Exfiltration
  • reversing, forensics & misc
    • Internals
    • Cloud
    • Neo4j
    • Dump Virtual Box Memory
    • AES Encryption Using Crypto++ .lib in Visual Studio C++
    • Reversing Password Checking Routine
Powered by GitBook
On this page
  1. offensive security

Privilege Escalation

Primary Access Token ManipulationWindows NamedPipes 101 + Privilege EscalationDLL HijackingWebShellsImage File Execution Options InjectionUnquoted Service PathsPass The Hash: Privilege Escalation with Invoke-WMIExecEnvironment Variable $Path InterceptionWeak Service Permissions
PreviousDetecting Sysmon on the Victim HostNextPrimary Access Token Manipulation