During Red Team assessments, after an attacker has compromised a system, they often move laterally through the network, gaining more relevant information on other systems.
In this article, we explore how a WebClient Workstation Takeover can occur during lateral movement by abusing WebDAV shares. Inspired by @tifkin_’s and the Certified
After working on Pass the Hash attack and Over the pass attack, it’s time to focus on a similar kind of attack called Pass the
In this post, we’ll discuss how an attacker uses the ccache file to compromise kerberos authentication to access the application server without using a password.
In this post, we’re going to talk about Over Pass the hash that added another step in passing the hash. Pass the hash is an
If you have been in the Information Security domain anytime in the last 20 years, you may have heard about Pass-the-Hash or PtH attack. It
In this article, we learn to use crackmapexec. This tool is developed by byt3bl33d3r. I have used this tool many times for both offensive and
WMI is used for a lot of stuff, but it can also be used for Lateral Movement around the network. This can be achieved using