Web Security Learning
stable
Content Index:
1. Prologue
2. Computer Networks and Protocols
3. Information Collection
4. Common vulnerability attack and defense
5. Language and Framework
6. Intranet penetration
6.1. Windows Intranet Penetration
6.1.1. Information collection
6.1.2. Persistence
6.1.3. Privilege
6.1.4. Trace cleaning
6.1.5. Lateral movement
6.1.6. Domain penetration
6.2. Linux Intranet Penetration
6.3. Backdoor Technology
6.4. General Skills
6.5. Reference Links
7. Cloud Security
8. Defense Technology
9. Authentication Mechanism
10. Tools and Resources
11. Manual Quick Check
12. Others
Web Security Learning
»
6.
Intranet penetration
»
6.1.
Windows Intranet Penetration
6.1.
Windows Intranet Penetration
ΒΆ
Content Index:
6.1.1. Information collection
6.1.1.1. Basic command
6.1.1.2. Domain Information
6.1.1.3. User Information
6.1.1.4. Network Information
6.1.1.5. Firewall
6.1.1.6. Password Information
6.1.1.7. Ticket Information
6.1.1.8. Special files
6.1.1.9. LAN Survival Host
6.1.1.10. Others
6.1.2. Persistence
6.1.2.1. Hidden files
6.1.2.2. Backdoor
6.1.2.3. Self-start
6.1.3. Privilege
6.1.3.1. UAC
6.1.3.2. Privilege Escalation
6.1.4. Trace cleaning
6.1.4.1. Logs
6.1.4.2. Registry
6.1.4.3. File
6.1.4.4. Timeline
6.1.4.5. Complete deletion
6.1.5. Lateral movement
6.1.5.1. Common Entry
6.1.5.2. LOLBAS
6.1.6. Domain penetration
6.1.6.1. Users
6.1.6.2. Intranet protocols
6.1.6.3. Domains
6.1.6.4. Active Directory
6.1.6.5. Group Policy
6.1.6.6. Windows implementation of Kerberos
6.1.6.7. Attack Types