This document is a work-in-progress where I’m compiling a variety of techniques for enumerating and exploiting Active Directory environments. It will be updated over time with additional steps and insights as I continue to explore and refine the methodology.
Path Hijacking is a technique where an attacker manipulates the $PATH environment variable to run malicious code by placing a malicious binary in a directory that is searched before the legitimate one. This can lead to executing unauthorized commands.
This document is a work-in-progress where I’m compiling a variety of common web vulnerabilities and exploitation techniques. It will be updated over time with additional insights and methodologies as I continue refining my approach.
Pivoting is a critical technique in penetration testing, allowing an attacker to move laterally through a network after compromising an initial system. The goal is to gain access to other systems or network segments that are not directly accessible from the attacker’s original position. This is achieved by leveraging the compromised machine as a relay point.
This document provides an overview of some essential tools and commands used in penetration testing. Each tool is briefly explained along with typical commands for common scenarios. It is important to note that each tool has many more commands and ways to be used, depending on the situation and the approach you want to take.