🐧
Hassan Saad
search
Ctrlk
  • WHO AM I ?
  • Red Teamingchevron-right
    • C2 Infrastructure
    • External Reconnaissance
    • Initial Compromisechevron-right
      • Executable File (EXE)
      • HTML Application (HTA)
      • Visual Basic (VBA Macros)
      • Password Spraying
      • MITM Attack
      • Email Spoofing
    • Host Reconnaissancechevron-right
    • Host Persistencechevron-right
    • Host Privilege Escalationchevron-right
    • Domain Reconnaissancechevron-right
    • Lateral Movementchevron-right
    • Credentials Accesschevron-right
    • Pivoting & Forwardingchevron-right
    • Kerberoschevron-right
    • Group Policychevron-right
    • Access Control Lists (DACL)chevron-right
    • MS SQL Serverschevron-right
    • Domain Dominancechevron-right
    • Forest & Domain Trustschevron-right
    • Evasion Techniqueschevron-right
  • Penetration Testingchevron-right
  • Technology Essentialschevron-right
  • Bug Huntingchevron-right
  • Toolschevron-right
  • Extraschevron-right
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Red Teaming

Initial Compromise

Executable File (EXE)chevron-rightHTML Application (HTA)chevron-rightVisual Basic (VBA Macros)chevron-rightPassword Sprayingchevron-rightMITM Attackchevron-rightEmail Spoofingchevron-right
PreviousExternal Reconnaissancechevron-leftNextExecutable File (EXE)chevron-right

Last updated 3 years ago