6.8. 参考链接
6.8.1. Windows
- Windows内网渗透提权
- 文件寄生 NTFS文件流实际应用
- Windows中常见后门持久化方法总结
- LOLBAS
- 渗透技巧——Windows单条日志的删除
- windows取证 文件执行记录的获取和清除
- Getting DNS Client Cached Entries with CIM/WMI
- Windows单机Persistence
6.8.1.1. 域渗透
- 绕过域账户登录失败次数的限制
- 域渗透总结
- got domain admin on internal network
- Mitigating Pass-the-Hash (PtH) Attacks and Other Credential Theft Techniques http://download.microsoft.com/download/7/7/A/77ABC5BD-8320-41AF-863C-6ECFB10CB4B9/Mitigating Pass-the-Hash (PtH) Attacks and Other Credential Theft Techniques_English.pdf`_
- 域渗透学习笔记
- QOMPLX Knowledge: Fundamentals of Active Directory Trust Relationships
- Kerberos的黄金票据详解
- DCShadow explained: A technical deep dive into the latest AD attack technique
- Active Directory Security
- Kerberos AD Attacks Kerberoasting
- Kerberos之域内委派攻击
6.8.2. RedTeam
6.8.3. 内网
- 内网安全检查
- 我所知道的内网渗透
- 从零开始内网渗透学习
- 渗透技巧 从Github下载安装文件
- An introduction to privileged file operation abuse on Windows
- 脚本维权tips
6.8.4. Cobalt Strike
来源:oschina
链接:https://my.oschina.net/u/4312121/blog/4358025