Home

Comité James Dyson architecte pipe lsarpc Se soûler Fait de Citoyenneté

Présentation du MS-RPC et de ses mécanismes de sécurité | Akamai
Présentation du MS-RPC et de ses mécanismes de sécurité | Akamai

ReactOS: dll/win32/lsasrv/lsarpc.c File Reference
ReactOS: dll/win32/lsasrv/lsarpc.c File Reference

MSRPC NULL sessions. Exploitation and protection. Jean-Baptiste Marchand -  PDF Free Download
MSRPC NULL sessions. Exploitation and protection. Jean-Baptiste Marchand - PDF Free Download

Blue Teamer: Adventures with NULL Sessions - Are They Really Disabled?
Blue Teamer: Adventures with NULL Sessions - Are They Really Disabled?

Hacking in 5 minutes with Remote Procedure Call and Active Directory  enumeration | by mucomplex | Medium
Hacking in 5 minutes with Remote Procedure Call and Active Directory enumeration | by mucomplex | Medium

MSRPC (Microsoft Remote Procedure Call) Service Enumeration | 0xffsec  Handbook
MSRPC (Microsoft Remote Procedure Call) Service Enumeration | 0xffsec Handbook

Network Relaying Abuse in a Windows Domain - LRQA Nettitude Labs
Network Relaying Abuse in a Windows Domain - LRQA Nettitude Labs

Hacking in 5 minutes with Remote Procedure Call and Active Directory  enumeration | by mucomplex | Medium
Hacking in 5 minutes with Remote Procedure Call and Active Directory enumeration | by mucomplex | Medium

Petit Potam - NTLM Relay Attack - More knowledge with ProSec GmbH
Petit Potam - NTLM Relay Attack - More knowledge with ProSec GmbH

PetitPotam NTLM Relay Attack - NetWitness Community - 645376
PetitPotam NTLM Relay Attack - NetWitness Community - 645376

GitHub - p33kab00/pipe-scan: Identify accessible named pipes.
GitHub - p33kab00/pipe-scan: Identify accessible named pipes.

Vadim Khrykov on X: "Has anybody tried to detect #BloodHound GPOGroupTasks  mode using EID 5145 + IPC named pipes (srvsvc/lsass/lsarpc/samr) events?  How do you collect such events and what EPS rate do
Vadim Khrykov on X: "Has anybody tried to detect #BloodHound GPOGroupTasks mode using EID 5145 + IPC named pipes (srvsvc/lsass/lsarpc/samr) events? How do you collect such events and what EPS rate do

MSRPC NULL sessions. Exploitation and protection. Jean-Baptiste Marchand -  PDF Free Download
MSRPC NULL sessions. Exploitation and protection. Jean-Baptiste Marchand - PDF Free Download

PetitPotam LAB PoC · sixstringacks
PetitPotam LAB PoC · sixstringacks

MSRPC NULL sessions. Exploitation and protection. Jean-Baptiste Marchand -  PDF Free Download
MSRPC NULL sessions. Exploitation and protection. Jean-Baptiste Marchand - PDF Free Download

Vulnérabilité Windows obtention d'informations à l'aide de NULL session |  Vigilance.fr
Vulnérabilité Windows obtention d'informations à l'aide de NULL session | Vigilance.fr

MSRPC NULL sessions. Exploitation and protection. Jean-Baptiste Marchand -  PDF Free Download
MSRPC NULL sessions. Exploitation and protection. Jean-Baptiste Marchand - PDF Free Download

使用PetitPotam代替Printerbug_mb61148b38081f6的技术博客_51CTO博客
使用PetitPotam代替Printerbug_mb61148b38081f6的技术博客_51CTO博客

The PetitPotam Story - K7 Labs
The PetitPotam Story - K7 Labs

GitHub - zcgonvh/EfsPotato: Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw  with SeImpersonatePrivilege local privalege escalation vulnerability).
GitHub - zcgonvh/EfsPotato: Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability).

Threat hunting for PsExec and other lateral movement tools
Threat hunting for PsExec and other lateral movement tools

关于Windows RPC挖掘的那些事- 先知社区
关于Windows RPC挖掘的那些事- 先知社区

关于Windows RPC挖掘的那些事- 先知社区
关于Windows RPC挖掘的那些事- 先知社区

Azure Active Directory Domain Services Escalation of Privilege | Secureworks
Azure Active Directory Domain Services Escalation of Privilege | Secureworks

PetitPotam NTLM Relay Attack - NetWitness Community - 645376
PetitPotam NTLM Relay Attack - NetWitness Community - 645376

Windows Archives - IT on the Couch
Windows Archives - IT on the Couch