Hacking 101 Windows Attack

WMI Attacks

WMI 101 WMI = Windows Management Instrumentation –> Microsoft implementationn of CIM (Common Information Model) and WBEM (Web Based Enterprise Management).–> Provides a uniform interface for applications/scripts to manage a local or remote computer or network. WMIC = Command-Line interface for WMI WMI Components https://0xinfection.github.io/posts/wmi-classes-methods-part-2/ WMI utilities Linux Manaed Object Format (MOF) files Use to […]

Hacking 101 Windows Attack

Common PowerShell Attacks

PowerShell basics PowerShell scripts can used multiple things such as: PowerShell Download and execute in memory of PowerShell: PowerShell and Active Directory Domain Enumeration Using .NET Classes Enumeration can be done by using Native Executables and .NET classes: Using the DirectoryServices.ActiveDirectory.Domain class and then static method GetCurrentDomain() Get the name of the current forest Using […]

Hacking 101

IOT : Penetration Testing

IOT Attack Vector Resource https://blog.certcube.com/iot-101/ https://sec4dev.io/sessions/iot-hacking-101 https://github.com/V33RU/IoTSecurity101 Training https://www.pentesteracademy.com/course?id=37 https://www.attify.com/iot-security-exploitation-training https://www.sans.org/cyber-security-courses/iot-penetration-testing/ IoT Penetration Testing Cookbook: Identify vulnerabilities and secure your smart devices The IoT Hacker’s Handbook: A Practical Guide to Hacking the Internet of Things Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things Advanced Penetration Testing Hacking IoT

Network Attack Wireless & RF-based Attacks

Airstrike Attack – FDE bypass and EoP on domain joined Windows workstations (CVE-2021-28316)

By default, domain joined Windows workstations allow access to the network selection UI from the lock screen. An attacker with physical access to a locked device with WiFi capabilities (such as a laptop or a workstation) can abuse this functionality to force the laptop to authenticate against a rogue access point and capture a MSCHAPv2 […]