Advanced Windows Persistence, Moreblessing Matake (Udemy), 2024
Expert Strategies for Achieving Long-Term Persistence and Evasion in Windows Systems!
This course explores advanced techniques for maintaining persistent access in Windows-based systems, a critical skill for both cybersecurity professionals and ethical hackers. As attackers often aim to establish long-term control over compromised systems, understanding Windows persistence mechanisms is essential for effective detection, defense, and incident response.
Designed for security professionals, penetration testers, and incident responders, this course enhances your ability to protect against advanced cyber threats and improves your capability to secure Windows environments.
❗️Official page
#education #windows
Expert Strategies for Achieving Long-Term Persistence and Evasion in Windows Systems!
This course explores advanced techniques for maintaining persistent access in Windows-based systems, a critical skill for both cybersecurity professionals and ethical hackers. As attackers often aim to establish long-term control over compromised systems, understanding Windows persistence mechanisms is essential for effective detection, defense, and incident response.
Designed for security professionals, penetration testers, and incident responders, this course enhances your ability to protect against advanced cyber threats and improves your capability to secure Windows environments.
❗️Official page
#education #windows
🔥3👍2
Mastering Active Directory Attacks: The Red Team Playbook by Daily REDTeam, 2024
Active Directory (AD) is the crown jewel for attackers during engagements. This comprehensive guide dives deep into techniques that every red teamer should have in their arsenal. From recon to privilege escalation, it's all about navigating and exploiting AD's complexity.
Key Highlights:
1️⃣ Reconnaissance with BloodHound & PowerView
Map out AD relationships and uncover attack paths using BloodHound.
Enumerate users, groups, and domain policies with PowerView.
2️⃣ Privilege Escalation:
Exploit Kerberoasting and Pass-the-Hash to compromise service accounts.
Abuse vulnerable Group Policy Objects (GPOs) to escalate privileges.
3️⃣ Credential Dumping:
Leverage Mimikatz and DCSync attacks to extract sensitive credentials.
Dump NTDS.dit for domain-wide access.
4️⃣ Kerberos Ticket Attacks:
Deploy Golden Ticket and Silver Ticket attacks to maintain persistent access.
Exploit Kerberoasting to crack service account credentials offline.
5️⃣ Misconfigurations to Exploit:
Attack poorly configured LDAP and SMB signing settings.
Abuse Active Directory Certificate Services (AD CS) for privilege escalation.
Tools for Success:
🛠 BloodHound
🛠 CrackMapExec
🛠 Mimikatz
🛠 Impacket
🛠 PingCastle
#windows
Active Directory (AD) is the crown jewel for attackers during engagements. This comprehensive guide dives deep into techniques that every red teamer should have in their arsenal. From recon to privilege escalation, it's all about navigating and exploiting AD's complexity.
Key Highlights:
1️⃣ Reconnaissance with BloodHound & PowerView
Map out AD relationships and uncover attack paths using BloodHound.
Enumerate users, groups, and domain policies with PowerView.
2️⃣ Privilege Escalation:
Exploit Kerberoasting and Pass-the-Hash to compromise service accounts.
Abuse vulnerable Group Policy Objects (GPOs) to escalate privileges.
3️⃣ Credential Dumping:
Leverage Mimikatz and DCSync attacks to extract sensitive credentials.
Dump NTDS.dit for domain-wide access.
4️⃣ Kerberos Ticket Attacks:
Deploy Golden Ticket and Silver Ticket attacks to maintain persistent access.
Exploit Kerberoasting to crack service account credentials offline.
5️⃣ Misconfigurations to Exploit:
Attack poorly configured LDAP and SMB signing settings.
Abuse Active Directory Certificate Services (AD CS) for privilege escalation.
Tools for Success:
🛠 BloodHound
🛠 CrackMapExec
🛠 Mimikatz
🛠 Impacket
🛠 PingCastle
#windows
🔥4❤3👍1
Attacking Active Directory (AD) Environment from Kali Linux By Seang Y Phuon - CEH [P], OSCP, CRTO and CRTE, Offensive Ops, 2024
Basically, to attack the Active Directory (AD) environment, the malicious attacker would need to obtain initial access to one of the computer systems within the network and in most of the cases it is Windows workstation. The attack of the Active Directory (AD) initiated from the compromised workstation usually be performed using PowerShell terminal and scripts which is known as Living-Off-The-Land (LOTL) approach utilizing the pre-installed or exiting tools and libraries within the workstation.
To set aside from the attacks using PowerShell within Windows system, the attack techniques outline in this research paper will be heavily relied on open-sourced tools and scripts published by security researchers around the world and to demonstrate the attacks on the Active Directory (AD) environment using Kali Linux system instead of Windows system as we usually see on most of the research materials.
❗️Source
#book #windows
Basically, to attack the Active Directory (AD) environment, the malicious attacker would need to obtain initial access to one of the computer systems within the network and in most of the cases it is Windows workstation. The attack of the Active Directory (AD) initiated from the compromised workstation usually be performed using PowerShell terminal and scripts which is known as Living-Off-The-Land (LOTL) approach utilizing the pre-installed or exiting tools and libraries within the workstation.
To set aside from the attacks using PowerShell within Windows system, the attack techniques outline in this research paper will be heavily relied on open-sourced tools and scripts published by security researchers around the world and to demonstrate the attacks on the Active Directory (AD) environment using Kali Linux system instead of Windows system as we usually see on most of the research materials.
❗️Source
#book #windows
🔥3👍2
📌 Decrypting the Selection of Supported Kerberos Encryption Types
📌 Disabling NTLMv1
📌 Removing SMBv1
📌 Enforcing LDAP Signing
📌 Enforcing AES for Kerberos
📌 Enforcing LDAP Channel Binding
📌 Enforcing SMB Signing
📌 Implementing Least Privilege
Extra
⛳️ Active Directory Hardening Best Practices
#windows #defensive
Please open Telegram to view this post
VIEW IN TELEGRAM
👍3👨💻1
DevSecOps for Azure. End-to-end supply chain security for GitHub, Azure DevOps, and the Azure cloud by David Okeyode and Joylynn Kirui, 2024
Starting with an overview of DevOps and its relationship with Agile methodologies and cloud computing, you'll gain a solid foundation in DevSecOps principles. The book then delves into the security challenges specific to DevOps workflows and how to address them effectively. You'll learn how to implement security measures in the planning phase, including threat modeling and secure coding practices.
You'll also explore pre-commit security controls, source control security, and the integration of various security tools in the build and test phases. The book covers crucial aspects of securing the release and deploy phases, focusing on artifact integrity, infrastructure as code security, and runtime protection.
By the end of this book, you’ll have the knowledge and skills to implement a secure code-to-cloud process for the Azure cloud.
#book #SecDevOps #windows
Starting with an overview of DevOps and its relationship with Agile methodologies and cloud computing, you'll gain a solid foundation in DevSecOps principles. The book then delves into the security challenges specific to DevOps workflows and how to address them effectively. You'll learn how to implement security measures in the planning phase, including threat modeling and secure coding practices.
You'll also explore pre-commit security controls, source control security, and the integration of various security tools in the build and test phases. The book covers crucial aspects of securing the release and deploy phases, focusing on artifact integrity, infrastructure as code security, and runtime protection.
By the end of this book, you’ll have the knowledge and skills to implement a secure code-to-cloud process for the Azure cloud.
#book #SecDevOps #windows
❤3🔥3
Внутреннее устройство Windows. Ключевые компоненты и возможности, 7-е издание, Руссинович Марк, Соломон Дэвид, Ионеску Алекс, Аллиеви Андреа, 2025
Зная, что находится у операционной системы «под капотом», системные администраторы смогут быстро разобраться с поведением системы и решать задачи повышения производительности и диагностики сбоев. Специалистам по безопасности пригодится информация о борьбе с уязвимостями операционной системы.
Седьмое издание было полностью переработано под Windows 10/11 и Windows Server (2022, 2019 и 2016). Кроме этого в книгу были добавлены сведения по Hyper-V, полностью переработаны главы о процессе загрузки, новых технологиях хранения данных и механизмах управления Windows. Вы найдете уникальную информацию, основанную на исходном коде Microsoft, и практические эксперименты с применением новейших средств отладки, направленные на демонстрацию особенностей поведения внутренних компонентов Windows. Новые элементы дизайна пользовательского интерфейса, появившиеся в Windows 11, основаны на знакомых по Windows 10 технологиях, поэтому читатели смогут сразу перейти на новый этап развития компьютерных технологий.
#book #windows
Зная, что находится у операционной системы «под капотом», системные администраторы смогут быстро разобраться с поведением системы и решать задачи повышения производительности и диагностики сбоев. Специалистам по безопасности пригодится информация о борьбе с уязвимостями операционной системы.
Седьмое издание было полностью переработано под Windows 10/11 и Windows Server (2022, 2019 и 2016). Кроме этого в книгу были добавлены сведения по Hyper-V, полностью переработаны главы о процессе загрузки, новых технологиях хранения данных и механизмах управления Windows. Вы найдете уникальную информацию, основанную на исходном коде Microsoft, и практические эксперименты с применением новейших средств отладки, направленные на демонстрацию особенностей поведения внутренних компонентов Windows. Новые элементы дизайна пользовательского интерфейса, появившиеся в Windows 11, основаны на знакомых по Windows 10 технологиях, поэтому читатели смогут сразу перейти на новый этап развития компьютерных технологий.
#book #windows
🔥4
Идем по киберследу. Анализ защищенности Active Directory c помощью утилиты BloodHound, Дмитрий Неверов, 2025
С помощью этой книги вы сможете освоить интерфейсы BloodHound и расширять его функционал для решения специфических задач вашей организации, научитесь писать эффективные запросы на языке Cypher для выявления скрытой опасности, визуализировать все опасные связи между объектами Active Directory и планировать действия по их устранению.
Не важно, специалист вы по безопасности, аудитор или участник Red Team, эта книга даст вам все необходимые знания для проведения глубокого анализа защищенности Active Directory и выявления потенциальных атак.
Необходимо помнить, что не только пользователи могут иметь права локального администратора на хосте, но и компьютеры.
#book #windows #pentest
С помощью этой книги вы сможете освоить интерфейсы BloodHound и расширять его функционал для решения специфических задач вашей организации, научитесь писать эффективные запросы на языке Cypher для выявления скрытой опасности, визуализировать все опасные связи между объектами Active Directory и планировать действия по их устранению.
Не важно, специалист вы по безопасности, аудитор или участник Red Team, эта книга даст вам все необходимые знания для проведения глубокого анализа защищенности Active Directory и выявления потенциальных атак.
Необходимо помнить, что не только пользователи могут иметь права локального администратора на хосте, но и компьютеры.
#book #windows #pentest
👍7🔥3
Windows Forensics. Understand Analysis Techniques for Your Windows by Dr. Chuck Easttom, Dr. William Butler, Jessica Phelan, Ramya Sai Bhagavatula, Sean Steuber, Karely Rodriguez, Victoria Indy Balkissoon, Zehra Naseer, 2024
This book is your comprehensive guide to Windows forensics. It covers the process of conducting or performing a forensic investigation of systems that run on Windows operating systems. It also includes analysis of incident response, recovery, and auditing of equipment used in executing any criminal activity.
The book covers Windows registry, architecture, and systems as well as forensic techniques, along with coverage of how to write reports, legal standards, and how to testify. It starts with an introduction to Windows followed by forensic concepts and methods of creating forensic images. You will learn Windows file artefacts along with Windows Registry and Windows Memory forensics. And you will learn to work with PowerShell scripting for forensic applications and Windows email forensics. Microsoft Azure and cloud forensics are discussed and you will learn how to extract from the cloud. By the end of the book you will know data-hiding techniques in Windows and learn about volatility and a Windows Registry cheat sheet.
#book #forensic #windows
This book is your comprehensive guide to Windows forensics. It covers the process of conducting or performing a forensic investigation of systems that run on Windows operating systems. It also includes analysis of incident response, recovery, and auditing of equipment used in executing any criminal activity.
The book covers Windows registry, architecture, and systems as well as forensic techniques, along with coverage of how to write reports, legal standards, and how to testify. It starts with an introduction to Windows followed by forensic concepts and methods of creating forensic images. You will learn Windows file artefacts along with Windows Registry and Windows Memory forensics. And you will learn to work with PowerShell scripting for forensic applications and Windows email forensics. Microsoft Azure and cloud forensics are discussed and you will learn how to extract from the cloud. By the end of the book you will know data-hiding techniques in Windows and learn about volatility and a Windows Registry cheat sheet.
#book #forensic #windows
👍4🔥3👀1
Windows Security Internals / Внутренние компоненты системы безопасности Windows, Forshaw James /Форшоу Джеймс, 2025
Power up your Windows security skills with expert guidance, in-depth technical insights, and dozens of real-world vulnerability examples from Google Project Zero’s most renowned researcher!
Learn core components of the system in greater depth than ever before, and gain hands-on experience probing advanced Microsoft security systems with the added benefit of PowerShell scripts.
Windows Security Internals is a must-have for anyone needing to understand the Windows operating system’s low-level implementations, whether to discover new vulnerabilities or protect against known ones. Developers, devops, and security researchers will all find unparalleled insight into the operating system’s key elements and weaknesses, surpassing even Microsoft’s official documentation.
Author James Forshaw teaches through meticulously crafted PowerShell examples that can be experimented with and modified, covering everything from basic resource security analysis to advanced techniques like using network authentication. The examples will help you actively test and manipulate system behaviors, learn how Windows secures files and the registry, re-create from scratch how the system grants access to a resource, learn how Windows implements authentication both locally and over a network, and much more.
#book #windows
Power up your Windows security skills with expert guidance, in-depth technical insights, and dozens of real-world vulnerability examples from Google Project Zero’s most renowned researcher!
Learn core components of the system in greater depth than ever before, and gain hands-on experience probing advanced Microsoft security systems with the added benefit of PowerShell scripts.
Windows Security Internals is a must-have for anyone needing to understand the Windows operating system’s low-level implementations, whether to discover new vulnerabilities or protect against known ones. Developers, devops, and security researchers will all find unparalleled insight into the operating system’s key elements and weaknesses, surpassing even Microsoft’s official documentation.
Author James Forshaw teaches through meticulously crafted PowerShell examples that can be experimented with and modified, covering everything from basic resource security analysis to advanced techniques like using network authentication. The examples will help you actively test and manipulate system behaviors, learn how Windows secures files and the registry, re-create from scratch how the system grants access to a resource, learn how Windows implements authentication both locally and over a network, and much more.
#book #windows
👍3🔥2
👍6👨💻1