Diminution Empire Inca Rire smb named pipe hochet Héritier technique
Lateral Movement With Named Pipes < BorderGate
Bartek Jerzman on X: "[#MemHuntTips 1] Detection of peer-to-peer C2 using Named Pipes over SMB (#T1071). PID 4 is the System process responsible for SMB connections and connects to Pipe created by
Named Pipe Pass-the-Hash | S3cur3Th1sSh1t
Windows NamedPipes 101 + Privilege Escalation - Red Team Notes
Offensive Windows IPC Internals 1: Named Pipes · csandker.io
Pipe Finder - Automated script to search in SMB protocol for availables pipe names
named-pipe-pivoting-opsec -
Guide to Named Pipes and Hunting for Cobalt Strike Pipes | by svch0st | Medium
ExploitWareLabs - SMB Named Pipe Pivoting in Metasploit's... | Facebook
Unable to find accessible named pipe!
Offensive Windows IPC Internals 1: Named Pipes · csandker.io
Hunting & Detecting SMB Named Pipe Pivoting (Lateral Movement) | by Ankith Bharadwaj | Medium
Offensive Windows IPC Internals 1: Named Pipes · csandker.io
Threat hunting Pivoting via SMB Named Pipe | by Tho Le | Medium
21.1 Meet the Plumbing: Named Pipes | Implementing CIFS: The Common Internet File System
Hunting & Detecting SMB Named Pipe Pivoting (Lateral Movement) | by Ankith Bharadwaj | Medium
Named Pipe Pivoting - Cobalt Strike
Named Pipe Client Impersonation - HackTricks
MS-SMB2]: Executing an Operation on a Named Pipe | Microsoft Learn
Named Pipe Pass-the-Hash | S3cur3Th1sSh1t
Named Pipe Pass-the-Hash | S3cur3Th1sSh1t
Pass-the-Hash Attack Over Named Pipes Against ESET Server Security - UI
Florian Roth on X: "Hunting & Detecting SMB Named Pipe Pivoting (Lateral Movement) by Ankith Bharadwaj https://t.co/tTeKFxd9rk https://t.co/WgeHntcHf0" / X
Hunting & Detecting SMB Named Pipe Pivoting (Lateral Movement) | by Ankith Bharadwaj | Medium
Pipe Finder - Automated script to search in SMB protocol for availables pipe names