Web Security Learning
stable

Content Index:

  • 1. Prologue
  • 2. Computer Networks and Protocols
  • 3. Information Collection
  • 4. Common vulnerability attack and defense
  • 5. Language and Framework
  • 6. Intranet penetration
    • 6.1. Windows Intranet Penetration
      • 6.1.1. Information collection
      • 6.1.2. Persistence
      • 6.1.3. Privilege
      • 6.1.4. Trace cleaning
      • 6.1.5. Lateral movement
      • 6.1.6. Domain penetration
    • 6.2. Linux Intranet Penetration
    • 6.3. Backdoor Technology
    • 6.4. General Skills
    • 6.5. Reference Links
  • 7. Cloud Security
  • 8. Defense Technology
  • 9. Authentication Mechanism
  • 10. Tools and Resources
  • 11. Manual Quick Check
  • 12. Others
Web Security Learning
  • »
  • 6. Intranet penetration »
  • 6.1. Windows Intranet Penetration

6.1. Windows Intranet PenetrationΒΆ

Content Index:

  • 6.1.1. Information collection
    • 6.1.1.1. Basic command
    • 6.1.1.2. Domain Information
    • 6.1.1.3. User Information
    • 6.1.1.4. Network Information
    • 6.1.1.5. Firewall
    • 6.1.1.6. Password Information
    • 6.1.1.7. Ticket Information
    • 6.1.1.8. Special files
    • 6.1.1.9. LAN Survival Host
    • 6.1.1.10. Others
  • 6.1.2. Persistence
    • 6.1.2.1. Hidden files
    • 6.1.2.2. Backdoor
    • 6.1.2.3. Self-start
  • 6.1.3. Privilege
    • 6.1.3.1. UAC
    • 6.1.3.2. Privilege Escalation
  • 6.1.4. Trace cleaning
    • 6.1.4.1. Logs
    • 6.1.4.2. Registry
    • 6.1.4.3. File
    • 6.1.4.4. Timeline
    • 6.1.4.5. Complete deletion
  • 6.1.5. Lateral movement
    • 6.1.5.1. Common Entry
    • 6.1.5.2. LOLBAS
  • 6.1.6. Domain penetration
    • 6.1.6.1. Users
    • 6.1.6.2. Intranet protocols
    • 6.1.6.3. Domains
    • 6.1.6.4. Active Directory
    • 6.1.6.5. Group Policy
    • 6.1.6.6. Windows implementation of Kerberos
    • 6.1.6.7. Attack Types
Previous Next

© Copyright 2019-2022, WebSecurity.

Built with Sphinx using a theme provided by Read the Docs.