Windows Server AD and O365 Advanced PenTest
Windows Server AD and O365 Advanced PenTest
•
•
•
•
•
•
•
• HTTPS://LEANPUB.COM/POWERSHELL101
• HTTPS://DOCS.MICROSOFT.COM/PT-BR/POWERSHELL/SCRIPTING/LEARN/PS101/01-GETTING-
STARTED?VIEW=POWERSHELL-7
• HTTPS://WWW.COMPARITECH.COM/NET-ADMIN/POWERSHELL-CHEAT-SHEET/
• HTTP://RAMBLINGCOOKIEMONSTER.GITHUB.IO/IMAGES/CHEAT-SHEETS/POWERSHELL-BASIC-CHEAT-SHEET2.PDF
• HTTPS://GIST.GITHUB.COM/PCGEEK86/336E08D1A09E3DD1A8F0A30A9FE61C8A
• HTTPS://GITHUB.COM/LAZYWINADMIN/POWERSHELL
• HTTPS://GITHUB.COM/CLYMB3R/POWERSHELL
• HTTPS://DOCS.MICROSOFT.COM/PT-BR/POWERSHELL/SCRIPTING/SAMPLES/SAMPLE-SCRIPTS-FOR-
ADMINISTRATION?VIEW=POWERSHELL-7
• HTTPS://WWW.UDEMY.COM/COURSE/APRENDA-POWERSHELL-DO-ZERO/
• HTTPS://WWW.UDEMY.COM/COURSE/AUTOMATIZANDO-ADMINISTRACAO-COM-POWERSHELL-CURSO-10961/
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=XODFGOJFR9Q
•
•
• HTTPS://MEDIUM.COM/@NALLAMUTHU/POWERSHELL-PORT-SCAN-BF27FC754585
• HTTPS://SID-500.COM/2017/11/12/TEST-PORT-USE-POWERSHELL-AS-A-PORT-SCANNER/
• HTTPS://TECHCOMMUNITY.MICROSOFT.COM/T5/ITOPS-TALK-BLOG/POWERSHELL-BASICS-HOW-TO-SCAN-OPEN-PORTS-WITHIN-A-
NETWORK/BA-P/924149
• HTTPS://GITHUB.COM/BORNTOBEROOT/POWERSHELL_IPV4PORTSCANNER
• HTTP://5UBTOOLS.BLOGSPOT.COM/
• HTTPS://GITHUB.COM/Z3R0TH-13/ENUM
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=QKZSIBEKAC0&AB_CHANNEL=TECHSNIPS
• HTTPS://GITHUB.COM/PYROTEK3/POWERSHELL-AD-RECON
• HTTPS://BLOG.STEALTHBITS.COM/PERFORMING-DOMAIN-RECONNAISSANCE-USING-POWERSHELL/
• HTTPS://MEDIUM.COM/@SMURF3R5/RECON-DOMAIN-SHARES-872914697980
• HTTPS://WWW.TRUSTEDSEC.COM/BLOG/POWERSHELL-RECONNAISSANCE/
• HTTPS://WWW.HEBUNILHANLI.COM/WONDERLAND/AD-PENTEST/RECON-WITH-POWERSHELL/
• HTTPS://PERICIACOMPUTACIONAL.COM/PENTESTING-WITH-POWERSHELL-IN-SIX-STEPS/
• HTTPS://GITHUB.COM/ELITELOSER/PSNMAP
• HTTPS://MEDIUM.COM/@DRAG0N/SOME-USEFUL-INTERESTING-POWERSHELL-SCRIPTS-
9B9490CEE0CD
• HTTPS://ADSECURITY.ORG/?P=2535
• HTTPS://WWW.VARONIS.COM/BLOG/POWERVIEW-FOR-PENETRATION-TESTING/
• HTTPS://WWW.SANS.ORG/BLOG/PEN-TEST-POSTER-WHITE-BOARD-POWERSHELL-BUILT-IN-PORT-
SCANNER/
• HTTPS://GITHUB.COM/SCIPAG/POWERSHELLUTILITIES
• HTTPS://WWW.ADAMCOUCH.CO.UK/CONDUCTING-POWERSHELL-PORT-SCAN/
• HTTPS://WWW.INFOSECMATTER.COM/MINIMALISTIC-TCP-AND-UDP-PORT-SCANNER/
• HTTPS://GITHUB.COM/XORRIOR/REMOTERECON
• HTTPS://GITHUB.COM/MATTIFESTATION/PSREFLECT
• HTTPS://GITHUB.COM/HARMJ0Y/CHEATSHEETS/BLOB/MASTER/POWERUP.PDF
• HTTPS://GITHUB.COM/HARMJ0Y/CHEATSHEETS/BLOB/MASTER/POWERSPLOIT.PDF
• HTTPS://GITHUB.COM/HARMJ0Y/CHEATSHEETS/BLOB/MASTER/EMPIRE.PDF
• HTTPS://GITHUB.COM/HARMJ0Y/CHEATSHEETS/BLOB/MASTER/POWERVIEW.PDF
• HTTPS://GITHUB.COM/POWERSHELLMAFIA/POWERSPLOIT/BLOB/MASTER/PRIVESC/POWERUP.P
S1
• HTTPS://WWW.HARMJ0Y.NET/BLOG/POWERSHELL/POWERUP-A-USAGE-GUIDE/
• HTTPS://RECIPEFORROOT.COM/ADVANCED-POWERUP-PS1-USAGE/
• HTTPS://JANIKVONROTZ.GITHUB.IO/POWERSHELL-POWERUP/
• HTTPS://MEDIUM.COM/BUGBOUNTYWRITEUP/PRIVILEGE-ESCALATION-IN-WINDOWS-
380BEE3A2842
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=DNWWTJFQW78&AB_CHANNEL=METASPLOITATIO
N
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=DLJYKGFKOKQ&AB_CHANNEL=SECURITYWEEKLY
• HTTPS://GITHUB.COM/POWERSHELLMAFIA/POWERSPLOIT
• HTTPS://PENTESTLAB.BLOG/TAG/POWERSPLOIT/
• HTTPS://WWW.CYBERPUNK.RS/POWERSPLOIT-POWERSHELL-POST-EXPLOITATION-FRAMEWORK
• HTTPS://WWW.DARKNET.ORG.UK/2015/12/POWERSPLOIT-POWERSHELL-POST-EXPLOITATION-
FRAMEWORK/
• HTTPS://ATTACK.MITRE.ORG/SOFTWARE/S0194/
• HTTPS://ADSECURITY.ORG/?TAG=POWERSPLOIT
• HTTPS://MEDIUM.COM/@BENOIT.SEVENS/POWERSHELL-AV-EVASION-4E4BB6A6A961
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=OTPPNWBEADA&AB_CHANNEL=CHIEFRIVER
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=LELL6QA-REY&AB_CHANNEL=METASPLOITATION
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=B-XJNMFZ7LS&AB_CHANNEL=%5BMISTER_BERT0NI%5D
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=ZBMOS_FNXNG&AB_CHANNEL=SECURITYNOTES
• HTTPS://DANIELDONDA.COM/2019/04/07/POWERSHELL-EMPIRE/
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=52XKWBDMUUM&AB_CHANNEL=HACKERSPLOIT
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=0GHS3U9ZMKI&AB_CHANNEL=GUSKHAWAJA
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=67EXQPHK2SE&AB_CHANNEL=SECKC
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=9-KWVLJDXWS&AB_CHANNEL=ROOTSPLOIT
• HTTPS://WWW.POWERSHELLEMPIRE.COM/
• HTTPS://WWW.CYBERPUNK.RS/EMPIRE-POWERSHELL-POST-EXPLOITATION-FRAMEWORK
• HTTPS://NULL-BYTE.WONDERHOWTO.COM/HOW-TO/USE-POWERSHELL-EMPIRE-GETTING-STARTED-WITH-POST-
EXPLOITATION-WINDOWS-HOSTS-0178664/
• HTTPS://WWW.HACKINGARTICLES.IN/HACKING-WITH-EMPIRE-POWERSHELL-POST-EXPLOITATION-AGENT/
• HTTPS://MEDIUM.COM/@RATIROS01/TRYHACKME-PS-EMPIRE-BD96FBF822CC
• HTTPS://BLOG.STEALTHBITS.COM/NEXT-GEN-OPEN-SOURCE-C2-FRAMEWORKS/
• HTTPS://GITHUB.COM/JAREDHAIGHT/INVOKE-METASPLOITPAYLOAD
• HTTPS://MEDIUM.COM/SWLH/FUN-WITH-POWERSHELL-PAYLOAD-EXECUTION-AND-EVASION-F5051FD149B2
• HTTPS://GITHUB.COM/TRUSTEDSEC/UNICORN
• HTTPS://GITHUB.COM/LOADENMB/TVASION
• HTTPS://THREAT.TEVORA.COM/DISSECTING-VEIL-EVASION-POWERSHELL-PAYLOADS-AND-CONVERTING-TO-A-BIND-SHELL/
• HTTPS://HAKIN9.ORG/XENCRYPT-A-POWERSHELL-SCRIPT-ANTI-VIRUS-EVASION-TOOL/
• HTTPS://ARNO0X0X.WORDPRESS.COM/2016/04/13/METERPRETER-AV-IDS-EVASION-POWERSHELL/
• HTTPS://HACK-ED.NET/2016/04/04/VEIL-EVASION-PAYLOADS-MADE-EASY/
• HTTPS://KAIZENSECURITY.WORDPRESS.COM/2016/08/19/METASPLOIT-AV-EVASION-WITH-POWERSHELL/
• HTTPS://WWW.BLACKHAT.COM/DOCS/EU-17/MATERIALS/EU-17-THOMPSON-RED-TEAM-TECHNIQUES-FOR-EVADING-
BYPASSING-AND-DISABLING-MS-ADVANCED-THREAT-PROTECTION-AND-ADVANCED-THREAT-ANALYTICS.PDF
• HTTPS://WWW.BLACKHAT.COM/DOCS/US-14/MATERIALS/US-14-KAZANCIYAN-INVESTIGATING-POWERSHELL-ATTACKS-
WP.PDF
• HTTPS://RESOURCES.INFOSECINSTITUTE.COM/POWERSHELL-FOR-PENTESTERS-PART-5-REMOTING-WITH-
POWERSHELL/
• HTTPS://PENTESTN00B.WORDPRESS.COM/2016/08/22/POWERSHELL-PSREMOTING-PWNAGE/
• HTTPS://KALILINUXTUTORIALS.COM/EVIL-WINRM-HACKING-PENTESTING/
• HTTPS://WWW.RAPID7.COM/DB/MODULES/EXPLOIT/WINDOWS/LOCAL/POWERSHELL_REMOTING
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=TVGJ-9FJKXE&AB_CHANNEL=HAK5
• HTTPS://GIST.GITHUB.COM/EGRE55/C058744A4240AF6515EB32B2D33FBED3
• HTTPS://GITHUB.COM/SWISSKYREPO/PAYLOADSALLTHETHINGS/BLOB/MASTER/METHODOLOGY%20AND%20RESOURCES/
REVERSE%20SHELL%20CHEATSHEET.MD
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=NJ5XBHRTWWA&AB_CHANNEL=CYBERSECURITYLEARNING
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=KKFRJTLM5LI&AB_CHANNEL=INFOSECADDICTS
• HTTPS://HACKERSINTERVIEW.COM/OSCP/REVERSE-SHELL-ONE-LINERS-OSCP-CHEATSHEET/
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=KKFRJTLM5LI&AB_CHANNEL=INFOSECADDICTS
• HTTPS://WWW.OFFENSIVE-SECURITY.COM/OFFSEC/KALI-LINUX-POWERSHELL-PENTESTING/
• HTTPS://SECURITYONLINE.INFO/REVERSE-POWERSHELL/
• HTTPS://BLOG.NETSPI.COM/POWERSHELL-REMOTING-CHEATSHEET/
• HTTPS://WWW.IRED.TEAM/MISCELLANEOUS-REVERSING-FORENSICS/GET-INJECTEDTHREAD
• HTTPS://MEDIUM.COM/@THREATPOINTER/PENTESTING-POWERSHELL-REMOTING-FA605EF325D4
• HTTPS://GITHUB.COM/JODYWEIJERS/BADUSB-DIGISPARK
• HTTPS://WWW.ZDNET.COM/ARTICLE/RARE-BADUSB-ATTACK-DETECTED-IN-THE-WILD-AGAINST-US-
HOSPITALITY-PROVIDER/
• HTTPS://HACKADAY.COM/TAG/BADUSB/
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=IAH5RUYO2VY&AB_CHANNEL=DIMUSTECH
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=M6BHXX75RMS&AB_CHANNEL=HAK5
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=M0AWKEF0B8C&AB_CHANNEL=IMMUNETECHNOLOGYINS
TITUTE
• HTTPS://GITHUB.COM/SCREETSEC/BRUTAL
• HTTPS://ATTACK.MITRE.ORG/TECHNIQUES/T1059/001/
• HTTPS://MEDIUM.COM/@SUBHAMMISRA45/LATERAL-MOVEMENT-POWERSHELL-REMOTING-89DA402A9885
• HTTPS://POSTS.SPECTEROPS.IO/OFFENSIVE-LATERAL-MOVEMENT-1744AE62B14F
• HTTPS://PT.SLIDESHARE.NET/KIERANJACOBSEN/LATERAL-MOVEMENT-WITH-POWER-SHELL-2
• HTTPS://WWW.IRED.TEAM/OFFENSIVE-SECURITY/LATERAL-MOVEMENT/WMI-+-POWERSHELL-DESIRED-STATE-
CONFIGURATION-LATERAL-MOVEMENT
• HTTPS://GENNAROMIGLIACCIO.COM/LATERAL-MOVEMENT-TACTICS-AND-TECHNIQUES
• HTTPS://REDCANARY.COM/BLOG/LATERAL-MOVEMENT-WINRM-WMI/
• HTTPS://WWW.FORWARDDEFENSE.COM/PDFS/LATERAL-MOVEMENT-ANALYSIS.PDF
• HTTPS://WWW.SNAPLABS.IO/INSIGHTS/LATERAL-MOVEMENT-METHODS-AND-GOOD-PRACTICES
• HTTPS://GIST.GITHUB.COM/JAREDCATKINSON/C95FD1E4E76A4B9B966861F64782F5A9
• HTTPS://ATTACK.MITRE.ORG/SOFTWARE/S0029/
• HTTPS://WWW.OFFENSIVE-SECURITY.COM/METASPLOIT-UNLEASHED/PSEXEC-PASS-HASH/
• HTTPS://WWW.CONTEXTIS.COM/DE/BLOG/LATERAL-MOVEMENT-A-DEEP-LOOK-INTO-PSEXEC
• HTTPS://WWW.MINDPOINTGROUP.COM/BLOG/LATERAL-MOVEMENT-WITH-PSEXEC/
• HTTPS://REDCANARY.COM/BLOG/THREAT-HUNTING-PSEXEC-LATERAL-MOVEMENT/
• HTTPS://MEDIUM.COM/@UPADHYAY.VARUN/PASS-THE-HASH-ATTACK-B0F214B2884A
• HTTPS://PERICIACOMPUTACIONAL.COM/WINDOWS-ACCOUNT-HIJACKING-PSEXEC-E-SUAS-POSSIBILIDADES/
• HTTPS://PENTESTLAB.BLOG/TAG/PSEXEC/
• HTTPS://WWW.TOSHELLANDBACK.COM/2017/02/11/PSEXEC/
• HTTPS://WWW.POFTUT.COM/USE-PSEXEC-TOOLS-RUN-COMMANDS-GET-SHELL-REMOTE-WINDOWS-SYSTEMS/
• HTTPS://WWW.IRED.TEAM/OFFENSIVE-SECURITY/LATERAL-MOVEMENT/LATERAL-MOVEMENT-WITH-PSEXEC
• HTTPS://WWW.VARONIS.COM/BLOG/HOW-TO-USE-POWERSHELL-FOR-PRIVILEGE-ESCALATION-WITH-LOCAL-COMPUTER-ACCOUNTS/
• HTTPS://GITHUB.COM/FRIZB/WINDOWS-PRIVILEGE-ESCALATION
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=-SBXN-CGUD0&AB_CHANNEL=PENTESTERACADEMYTV
• HTTPS://HAKIN9.ORG/PRIVESCCHECK-PRIVILEGE-ESCALATION-ENUMERATION-SCRIPT-FOR-WINDOWS/
• HTTPS://GITHACKTOOLS.BLOGSPOT.COM/2019/04/WINROOTHELPER-WINDOWS-PRIVILEGE-ESCALATION-POWERSHELL-SCRIPT.HTML
• HTTPS://WWW.HACKINGARTICLES.IN/WINDOW-PRIVILEGE-ESCALATION-VIA-AUTOMATED-SCRIPT/
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=VLKPCSQW8QY&AB_CHANNEL=UBEERILABS
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=BANOHAIAQ7U&AB_CHANNEL=SANSPENTESTTRAINING
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=2VZOSUJ4NWU&AB_CHANNEL=CYBERSTORM-WARFAREINTHE5THDOMAIN
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=V0ZYORQ0EEY&AB_CHANNEL=POWERSHELLEMPIRETUTORIALS
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=DZJFIIW3KZE&AB_CHANNEL=MOSS%C3%A9CYBERSECURITYINSTITUTE
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=_BPBQUU91-Q&AB_CHANNEL=BREAKTHESECURITY
• HTTPS://GITHUB.COM/RMUSSER01/INFOSEC_REFERENCE/BLOB/MASTER/DRAFT/PRIVESCPOSTEX.MD
• HTTPS://PENTESTLAB.BLOG/2017/08/19/COMMAND-AND-CONTROL-POWERSHELL/
• HTTPS://ENIGMA0X3.NET/2014/01/17/COMMAND-AND-CONTROL-USING-POWERSHELL-AND-YOUR-
FAVORITE-WEBSITE/
• HTTPS://WWW.SNAPLABS.IO/INSIGHTS/COMMAND-AND-CONTROL-WITH-POWERSHELL-EMPIRE-PT1
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=WVHVDUVFQNM&AB_CHANNEL=DEMMSEC
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=OH-LCN5K9K8&AB_CHANNEL=COVER6SOLUTIONS
• HTTPS://TRUNESKI.GITHUB.IO/BLOG/2017/03/03/DROPBOX-COMMAND-AND-CONTROL-OVER-
POWERSHELL-WITH-INVOKE-DBC2/
• HTTPS://WWW.COVER6SOLUTIONS.COM/WEBINAR-INTRO-TO-C2-WITH-POWERSHELL-EMPIRE/
• HTTPS://PENTESTLAB.BLOG/2019/11/05/PERSISTENCE-POWERSHELL-PROFILE/
• HTTPS://PENTESTLAB.BLOG/2019/11/04/PERSISTENCE-SCHEDULED-TASKS/
• HTTPS://GITHUB.COM/EMILYANNCR/WINDOWS-POST-EXPLOITATION
• HTTPS://ADSECURITY.ORG/?P=429
• HTTPS://BOOK.HACKTRICKS.XYZ/WINDOWS/BASIC-POWERSHELL-FOR-PENTESTERS
• HTTPS://MEDIA.BLACKHAT.COM/EU-13/BRIEFINGS/MITTAL/BH-EU-13-POWERSHELL-FOR-PENETRATION-
MITTAL-SLIDES.PDF
• HTTPS://WWW.IRED.TEAM/OFFENSIVE-SECURITY/EXFILTRATION
• HTTPS://AZERIA-LABS.COM/DATA-EXFILTRATION/
• HTTPS://WWW.HACKINGARTICLES.IN/DATA-EXFILTRATION-USING-POWERSHELL-EMPIRE/
• HTTPS://WWW.SANS.ORG/WEBCASTS/PEN-TESTING-POWERSHELL-DATA-EXFILTRATION-TECHNIQUES-108740
• HTTPS://BLOG.STACKATTACK.NET/2019/03/14/QUICK-HIT-BASE64-POWERSHELL-EXFILTRATION/
• HTTPS://NIICONSULTING.COM/CHECKMATE/2016/03/EXFILTRATION-USING-POWERSHELL-OUTLOOK/
• HTTPS://WWW.SEVENLAYERS.COM/INDEX.PHP/305-POWERSHELL-DATA-EXFIL
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=8ZAREHY5HBW
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=TBBT1C2ZJMS&AB_CHANNEL=HAK5
• HTTPS://WWW.YOUTUBE.COM/WATCH?V=MIQVVX943FW&AB_CHANNEL=SANSPENTESTTRAINING
• HTTPS://GITHUB.COM/TOPICS/PENETRATION-TESTING?L=POWERSHELL
• HTTPS://WWW.FIREEYE.COM/CONTENT/DAM/FIREEYE-WWW/GLOBAL/EN/SOLUTIONS/PDFS/WP-LAZANCIYAN-
INVESTIGATING-POWERSHELL-ATTACKS.PDF
• HTTPS://LIVE.SYSINTERNALS.COM/
• HTTPS://GITHUB.COM/BLUSCREENOFJEFF/RED-TEAM-INFRASTRUCTURE-WIKI
• HTTPS://BLOG.HARMJ0Y.NET/
• HTTPS://ENIGMA0X3.NET/
• HTTPS://WALD0.COM/
• HTTPS://POSTS.SPECTEROPS.IO/
• HTTP://WWW.EXPLOIT-MONDAY.COM/
• HTTPS://ADSECURITY.ORG/
• HTTP://WWW.INVOKE-IR.COM/
• HTTPS://SPECTEROPS.IO/RESOURCES/RESEARCH-AND-DEVELOPMENT
• HTTPS://WWW.BLACKHAT.COM/US-16/TRAINING/ADVANCED-POWERSHELL-FOR-OFFENSIVE-
OPERATIONS.HTML
•
•
•
•
•
•
•
Pentest in Office365 and
Security
Joas Antonio
Details
• This pdf aims to bring techniques and tools for performing pentesting
in Office365 environments
My LinkedIn: https://www.linkedin.com/in/joas-antonio-dos-santos
Introduction
• https://docs.microsoft.com/pt-br/microsoft-365/?view=o365-worldwide
• https://docs.microsoft.com/pt-br/office/
• https://docs.axway.com/bundle/AMPLIFY_Integration_Builder_allOS_en/p
age/microsoft_office_365_api_documentation.html
• https://system.suny.edu/userservices/office365-faq/
• https://github.com/MicrosoftDocs/microsoft-365-docs
• https://techdocs.blogs.brynmawr.edu/6634
• https://www.varonis.com/blog/microsoft-office-365-file-sharing/
• https://www.youtube.com/watch?v=01T6gSvR0xs
Introduction
• https://www.microsoft.com/pt-br/microsoft-365
• https://www.microsoft.com/pt-br/microsoft-365/microsoft-office
• https://www.microsoft.com/pt-br/microsoft-365/microsoft-365-for-
existing-subscribers
• https://www.youtube.com/watch?v=HhgpVvqZhzA
• https://www.youtube.com/watch?v=zsBt85WjtIY
PenTest in Office365
• https://www.microsoft.com/en-us/msrc/pentest-rules-of-engagement
• https://www.agileit.com/news/pentesting-microsoft-office-365/
• https://bond-o.medium.com/microsoft-office-365-enumeration-58f9b5ba21c8
• https://www.mdsec.co.uk/2019/07/introducing-the-office-365-attack-toolkit/
• https://thecyphere.com/blog/office365-security-best-practices/
• https://www.lmgsecurity.com/will-you-be-pwned-in-an-office-365-brute-force-attack-
use-this-free-tool-for-testing/
• https://intercom.help/cobalt/en/articles/4641747-network-office-365-penetration-
testing
• https://www.trustedsec.com/blog/owning-o365-through-better-brute-forcing/
• https://www.redscan.com/news/office-365-security-six-ways-to-safeguard-your-
environment-against-cyber-attacks/
• https://www.kitploit.com/2019/07/o365-attack-toolkit-toolkit-to-attack.html?m=0
PenTest in Office365
• https://vapt.ee/offensive-security/penetration-testing/cloud-penetration-testing/office365-
penetration-testing/
• https://www.blackhillsinfosec.com/tag/office365/
• https://github.com/0xZDH/o365spray
• https://github.com/S3cur3Th1sSh1t/Pentest-Tools
• https://github.com/mdsecresearch/LyncSniper
• https://github.com/byt3bl33d3r/SprayingToolkit
• https://github.com/sensepost/ruler
• https://pentestbook.six2dez.com/enumeration/cloud/azure
• https://www.blackhatethicalhacking.com/tools/o365-attack-toolkit/
• https://www.cryptron.ch/security-analysis-microsoft-office-365-advanced-threat-protection/
• https://securityonline.info/raindance/
• https://www.microsoft.com/pt-br/msrc/pentest-rules-of-engagement
PenTest in Office365
• https://www.agileit.com/news/pentesting-microsoft-office-365/
• https://www.mdsec.co.uk/2019/07/introducing-the-office-365-attack-toolkit/
• https://thecyphere.com/blog/office365-security-best-practices/
• https://www.linkedin.com/pulse/risk-assessment-penetration-testing-microsoft-azure-satinder/
• https://www.cryptron.ch/security-analysis-microsoft-office-365-advanced-threat-protection/
• https://i.blackhat.com/USA-20/Thursday/us-20-Bienstock-My-Cloud-Is-APTs-Cloud-Investigating-And-Defending-
Office-365.pdf
• https://i.blackhat.com/USA-19/Wednesday/us-19-Metcalf-Attacking-And-Defending-The-Microsoft-Cloud.pdf
• https://www.blackhat.com/docs/us-17/wednesday/us-17-Dods-Infecting-The-Enterprise-Abusing-Office365-
Powershell-For-Covert-C2.pdf
• https://github.com/Kyuu-Ji/Awesome-Azure-Pentest
• https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Cloud%20-
%20Azure%20Pentest.md
• https://book.hacktricks.xyz/cloud-security/cloud-security-review
• https://www.blackhillsinfosec.com/exploiting-mfa-inconsistencies-on-microsoft-services/
• https://www.optiv.com/insights/source-zero/blog/go365-office-365-password-spraying-tool
Phishing Office365
• https://github.com/duocircle/Office365-Phishing-Rules
• https://github.com/AlteredSecurity/365-Stealer
• https://github.com/mdsecactivebreach/o365-attack-toolkit
• https://docs.microsoft.com/en-us/microsoft-365/admin/security-and-compliance/set-up-multi-factor-
authentication?redirectSourcePath=%252fen-us%252farticle%252fSet-up-multi-factor-authentication-for-
Office-365-users-8f0454b2-f51a-4d9c-bcde-2c48e41621c6&view=o365-worldwide#enablemfaoffice365
• https://github.com/MicrosoftDocs/microsoft-365-docs/blob/public/microsoft-365/security/office-365-
security/set-up-anti-phishing-policies.md
• https://github.com/pentestgeek/phishing-frenzy-templates/tree/master/office365
• https://github.com/MicrosoftDocs/microsoft-365-docs/blob/public/microsoft-365/campaigns/m365-
campaigns-phishing-and-attacks.md
• https://github.com/MicrosoftDocs/microsoft-365-docs/blob/public/microsoft-365/security/office-365-
security/tuning-anti-phishing.md
• https://github.com/milo2012/phishing-scripts/blob/master/o365.py
• https://github.com/MicrosoftDocs/microsoft-365-docs/blob/public/microsoft-365/security/office-365-
security/recommended-settings-for-eop-and-office365.md
Phishing Office365
• https://github.com/MicrosoftDocs/microsoft-365-docs/blob/public/microsoft-
365/security/office-365-security/attack-simulation-training.md
• https://techcommunity.microsoft.com/t5/security-compliance-and-identity/attack-simulator-
need-a-real-phishing-template-library-to-be/m-p/1405895
• https://staaldraad.github.io/2017/08/02/o356-phishing-with-oauth/
• https://medium.com/sekoia-io-blog/analysis-and-detection-of-mitm-phishing-attacks-bypassing-
2fa-o365-use-case-cf0ffdae9cae
• https://hooksecurity.co/phishing-examples/github-phishing-example
• https://otx.alienvault.io/pulse/5df9f836cfe26eacac1703ad
• https://github.com/MicrosoftDocs/microsoft-365-docs/blob/public/microsoft-
365/security/office-365-security/attack-simulator.md
• https://github.com/MicrosoftLearning/MS-500-Microsoft-365-
Security/blob/master/Instructions/Labs/MS500T00/LAB_AK_06_Lab1_Ex1_Phishing_attack.md
• https://github.com/MicrosoftLearning/MS-101T00-Microsoft-365-Mobility-and-
Security/blob/master/Instructions/Labs/LAB_AK_03_Lab3_Ex1_AttackSim_Phishing_attack.md
Office 365 Security
• https://github.com/MicrosoftDocs/microsoft-365-docs/blob/public/microsoft-365/security/office-365-security/defender-for-office-365.md
• https://github.com/microsoft/Microsoft-365-Defender-Hunting-Queries/blob/master/Delivery/Open%20email%20link.txt
• https://github.com/MicrosoftDocs/microsoft-365-docs/blob/public/microsoft-365/security/office-365-security/security-recommendations-for-
priority-accounts.md
• https://docs.microsoft.com/pt-br/microsoft-365/security/defender/overview-security-center?view=o365-
worldwide#:~:text=O%20Microsoft%20365%20de%20seguran%C3%A7a,seguran%C3%A7a%20para%20o%20portal%20unificado.&text=As%20fun%C3
%A7%C3%B5es%20j%C3%A1%20nos%20produtos,portal%20Microsoft%20365%20seguran%C3%A7a%2C%20automaticamente.
• https://www.microsoft.com/security/blog/office-365-security/
• https://www.cloudfastpath.com/office-365-migration/top-office-365-security-features-examples/
• https://docs.microsoft.com/pt-br/microsoft-365/security/office-365-security/security-dashboard?view=o365-worldwide
• https://www.youtube.com/watch?v=eBByRs1GsuA
• https://www.youtube.com/watch?v=hI4Kid-uzxY
• https://techcommunity.microsoft.com/t5/security-compliance-and-identity/announcing-microsoft-365-security-for-it-pros-2021-edition/m-
p/1518661
• https://medium.com/falconforce/reducing-your-office365-attack-surface-1073a4d46a7b
• https://www.beazley.com/documents/TMB/Insights/beazley-bbr-hardening_O365_best_practices_08312018.pdf
• https://www.cisecurity.org/benchmark/microsoft_office/
• https://static1.squarespace.com/static/5bbb4a7301232c6e6c8757fa/t/603f6ea2dbc4a57691453b61/1614769826578/Office+365+Hardening.pdf
Windows Privilege Escalation
- Overview
Joas Antonio
Details
• This book aims to show the techniques of Privilege Escalation in
Windows;
• It is not a practical book, just an overview with references to help you
in your research;
• https://www.linkedin.com/in/joas-antonio-dos-santos
Low Hanging Passwords
• https://medium.com/hackernoon/picking-the-low-hanging-
passwords-b64684fe2c7
• https://vdalabs.com/2019/10/17/password-security/
Enumeration
• https://arnavtripathy98.medium.com/smb-enumeration-for-penetration-
testing-e782a328bf1b
• https://medium.com/bugbountywriteup/automating-ad-enumeration-
with-frameworks-f8c7449563be
• https://medium.com/@Shorty420/enumerating-ad-98e0821c4c78
• https://github.com/PowerShellMafia/PowerSploit/blob/master/Recon/Po
werView.ps1
• https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-
Sheet#domain-enumeration
• https://www.ired.team/offensive-security/enumeration-and-discovery
Interesting Files and Registrys
• https://medium.com/@hakluke/sensitive-files-to-grab-in-windows-
4b8f0a655f40
Important Extensions: install, backup, .bak, .log, .bat, .cmd, .vbs, .conf,
.cnf, .config, .ini, .xml, .txt, .gpg, .pgp, .p12, der, id_rsa, .ovpn
h ttp s : / / w ww.eld oled .com / cms _ f ile .ph p?f ro mDB =55 6 7
h ttp s : / / b ook .h acktricks . xyz / win do ws / w ind ow s -lo cal - pr ivile ge -e s calation
h ttp s : / / w ww.h ackin ga r ticles .in / win do w - p rivileg e - es cala tion - au to mated -
s cr i p t /
h ttp s : / / rah ma tn ur f au zi. med ium .com / win do ws - pr ivileg e - es cala tion - s cripts -
te ch n i qu es - 3 0fa 37 b d1 94
h ttp s : / / h akin 9. or g /p rives cch eck - p rivileg e - es cala tion - en ume ratio n - s crip t-
f o r - w in do w s /
Screensaver
h t t p s :/ / ke vi na l ma n sa . g i thu b. i o / a ppl i c a ti o n% 2 0 s e c u ri ty / D LL - P r ox y i n g /
https://www.windowstricks.in/2018/08/how -to-run-the-powershell-script-in-scheduled-task-with-
run-as-administrator.html
https://stackoverflow.com/questions/62245797/how -to-setup-a-powershell-script-in-windows-task-
scheduler-with-admin-permission
https://superuser.com/questions/1640613/how -to-run-a-powershell-script-with-elevated-access-
using-task-scheduler
https://blog.netwrix.com/2018/07/03/how -to-automate-powershell-scripts-with-task-scheduler/
https://www.reddit.com/r/PowerShell/comments/6qvp30/task_schedule_powershell_script_with_ad
min_rights/
https://o365reports.com/2019/08/02/schedule -powershell-script-task-scheduler/
https://pentestlab.blog/2019/11/04/persistence -scheduled-tasks/
https://www.elastic.co/guide/en/security/current/persistence -via-telemetrycontroller-scheduled-
task-hijack.html
https://attack.mitre.org/techniques/T1053/005/
Multiaction Task
https://pentestlab.blog/2020/01/21/persistence -wmi-event-subscription/
https://www.elastic.co/guide/en/security/current/persistence -via-wmi-event-subscription.html
https://medium.com/threatpunter/detecting -removing-wmi-persistence-60ccbb7dff96
https://www.mdsec.co.uk/2019/05/persistence -the-continued-or-prolonged-existence-of-
something-part-3-wmi-event-subscription/
https://liberty-shell.com/sec/2019/06/16/wmi -persistence/
https://techcommunity.microsoft.com/t5/microsoft -defender-for-endpoint/asr-in-intune-for-quot-
block-persistence-through-wmi-event/m-p/2068130
https://www.rapid7.com/db/modules/exploit/windows/local/wmi_persistence/
Appcert DLLS
h t t p s : / / w w w. e l a s t i c . c o / g u i d e / e n / s e c u r i t y / c u r r e n t / r e g i s t r y - p e r s i s t e n c e - v i a - a p p i n i t -
dll.html
h t t p s : / / w w w. c y b e r h u n t i n g g u i d e . n e t / t 1 5 4 6 0 1 0 . h t m l
Netsh Helper DLL
h t t p s : / / a t t a c k . m i t r e . o r g / t e c h n i q u e s / T 1 5 4 6 / 0 0 7/
h t t p s : / / w w w. i r e d . t e a m / o f f e n s i v e - s e c u r i t y / p e r s i s t e n c e / t 1 1 2 8 - n e t s h - h e l p e r - d l l
h t t p s : / / w w w. h a c k i n g a r t i c l e s . i n / w i n d o w s - p e r s i s t e n c e - u s i n g - n e t s h /
h t t p s : / / w w w. r e d d i t . c o m / r / n e t s e c / c o m m e n t s / d o n w j 5 / p e r s i s t e n c e _ n e t s h _ h e l p e r _ d l l /
h t t p s : / / l i b e r t y - s h e l l . c o m / s e c / 2 0 1 8 / 0 7/ 2 8 / n e t s h l e p /
h ttp s : / / w ww.ire d.tea m / of f en sive - s ecu rity / pe rs is te nce / t1 2 09 - hijack ing -tim e-
p r ov i de rs
h ttp s : / / me diu m.co m / @gab riel. pir jo les cu / de mys tifyin g - win do w s -m alwa re -
h u n ti ng - pa r t- 1 -d etectin g - p er sis ten ce - with- os q ue r y -b 53 5 73 c2 aac0
Port Monitors
h t t p s :/ / s e c uri tyo nl i ne . in f o / a ut o ma te d - p e rs i s te nt -b a c k do o r - me ta s pl o i t /
h t t p s :/ / s e c nha ck . i n / te ch ni qu e -t o -p e rs i s te n ce -o n -wi n do w s -1 0 - wi th - me ta s pl o i t /
h t t p s :/ / pe n te s tl a b. bl o g / 2 0 2 0 / 0 2 / 0 4 / p e rs i s te nc e -wa i t f o r /
h t t p s :/ / way s2 ha c k . co m / me ta spl o i t -f ra me w o r k /