Persistence - COM Hijacking
1) Enumeration of COM hijackable keys manually through PowerShell and via scripts.
2) Code execution via TreatAs and ProgID
3) Establish persistence via Cache Task and Internet Explorer.
Видео Persistence - COM Hijacking канала Pentest Laboratories
2) Code execution via TreatAs and ProgID
3) Establish persistence via Cache Task and Internet Explorer.
Видео Persistence - COM Hijacking канала Pentest Laboratories
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![MSBuild without MSBuild](https://i.ytimg.com/vi/HfpmqgwvGx4/default.jpg)
![Abusing .NET Core - Evasion](https://i.ytimg.com/vi/yytWD9RW-io/default.jpg)
![Domain Escalation - sAMAccountName Spoofing](https://i.ytimg.com/vi/Q1ihgDXGEB0/default.jpg)
![WaitFor - Download and Execute Arbitrary Code](https://i.ytimg.com/vi/yzRQhutZpg4/default.jpg)
![Domain Persistence - Machine Account](https://i.ytimg.com/vi/uFjpPUuY_7g/default.jpg)
![Account Persistence - Certificates](https://i.ytimg.com/vi/Pwt2kk2vJDM/default.jpg)
![Domain Persistence - Golden Certificate](https://i.ytimg.com/vi/2KZCsfplSlI/default.jpg)
![Universal Privilege Escalation and Persistence - Printer](https://i.ytimg.com/vi/ktqfhfIOyq0/default.jpg)
![Lateral Movement - Windows Services](https://i.ytimg.com/vi/c5k6XAcNNOA/default.jpg)
![Process Herpaderping - Windows Defender Evasion](https://i.ytimg.com/vi/FIDCLMvH6Vs/default.jpg)
![Resource Based Constrained Delegation](https://i.ytimg.com/vi/VhbNYwLlu10/default.jpg)
![AppDomainManager Injection](https://i.ytimg.com/vi/1TkK8lfu0NQ/default.jpg)
![RID Hijacking](https://i.ytimg.com/vi/CyS24beSHC8/default.jpg)
![Remote Potato - From Domain User to Enterprise Admin](https://i.ytimg.com/vi/aXtJzn2dsp4/default.jpg)
![AMSI Bypass Methods](https://i.ytimg.com/vi/6WBkBU0733o/default.jpg)
![Process Ghosting](https://i.ytimg.com/vi/OamW6-nu8PA/default.jpg)
![Shadow Credentials](https://i.ytimg.com/vi/6IyG_DA_0Vg/default.jpg)
![Domain Escalation - ShadowCoerce](https://i.ytimg.com/vi/8ChZDeizjII/default.jpg)
![Parent PID Spoofing](https://i.ytimg.com/vi/Fz3d5bFBKJ0/default.jpg)
![Password Filter DLL](https://i.ytimg.com/vi/hqtGdfULemQ/default.jpg)
![Credentials Dumping - RDP](https://i.ytimg.com/vi/KzP-yx6Dq_U/default.jpg)