Security
Headlines
HeadlinesLatestCVEs

Tag

#Privilege Escalation

Resource Based Constrained Delegation

Microsoft in an attempt to provide more flexibility to domain users enabled owner of resources to configure which accounts are trusted and allowed to delegate… Continue reading → Resource Based Constrained Delegation

Pentestlab
#Privilege Escalation#RBCD#Resource Based Constrained Delegation#Rubeus#WebDAV
Rootend - A *Nix Enumerator And Auto Privilege Escalation Tool

<div class="separator" style="clear: both; text-align: center;"><a href="https://1.bp.blogspot.com/-dlBoxE4Rzf4/YT_yEy5Zt0I/AAAAAAAAul8/_6UiYaOb1IY1WJtM2lqSN0YfsC0TxvixACNcBGAsYHQ/s663/rootend.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="575" data-original-width="663" src="https://1.bp.blogspot.com/-dlBoxE4Rzf4/YT_yEy5Zt0I/AAAAAAAAul8/_6UiYaOb1IY1WJtM2lqSN0YfsC0TxvixACNcBGAsYHQ/s16000/rootend.png" /></a></div><p><br /></p> <p>rootend is a python *nix Enumerator &amp; Auto <a href="https://www.kitploit.com/search/label/Privilege%20Escalation" target="_blank" title="Privilege Escalation">Privilege Escalation</a> tool.</p> <p><em>For a full list of our tools, please visit our website <a href="https://www.twelvesec.com/" rel="nofollow" target="_blank" title="https://www.twelvesec.com/">https://www.twelvesec.com/</a></em></p> <p>Written by:</p> <ul> <li><a href="https://github.com/nickvourd" rel="nofollow" target="_blank" title...

HiveNightmare

The security account manager (SAM) file contains the password hashes of the users on a Windows system. Since it is considered a sensitive file SYSTEM… Continue reading → HiveNightmare

Universal Privilege Escalation and Persistence – Printer

The Print Spooler is responsible to manage and process printer jobs. It runs as a service with SYSTEM level privileges on windows environments. Abuse of… Continue reading → Universal Privilege Escalation and Persistence – Printer

Remote Potato – From Domain User to Enterprise Admin

NTLM Relaying is an well-known technique that was mainly used in security assessments in order to establish some sort of foothold on a server in… Continue reading → Remote Potato – From Domain User to Enterprise Admin