{"version":1,"pages":[{"id":"L0yhlGs4ZlAHqnrt6NnW","title":"The Red-Book","pathname":"/","siteSpaceId":"sitesp_6kTLM","description":"The Art of Offensive CyberSecurity"},{"id":"7qTGUdST7c9Hy4zH9krF","title":"Reconnaissance","pathname":"/redteam/recon","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Reconnaissance - Tactic TA0043","breadcrumbs":[{"label":"Red-Teaming"}]},{"id":"U5WRf1UGl4t9nYWMtEos","title":"DNS Enumeration","pathname":"/redteam/recon/dns-enum","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™  Gather Victim Network Information: DNS - T1590.002","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Reconnaissance"}]},{"id":"glPoGPsjUo3C9QNkAkVU","title":"Subdomains enumeration","pathname":"/redteam/recon/subdomains-enumeration","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Reconnaissance"}]},{"id":"0sk3HfWf2TNXK13TEeuH","title":"Email Harvesting","pathname":"/redteam/recon/email-harvesting","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Account Discovery - Technique T1087","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Reconnaissance"}]},{"id":"wsgjuobKtKPa4Vv8Luk7","title":"Host Discovery","pathname":"/redteam/recon/host-discovery","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Reconnaissance"}]},{"id":"G3RG3CkeT1FJyHfrysuO","title":"TCP/UDP Service Scanning","pathname":"/redteam/recon/tcp-udp-service-scanning","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™  Network Service Discovery - Technique T1046","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Reconnaissance"}]},{"id":"z0Jpy2ETbLOXHhQXdVok","title":"Vulnerability Scanning","pathname":"/redteam/recon/vulnerability-scanning","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™  Active Scanning: Vulnerability Scanning - Technique T1595.002","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Reconnaissance"}]},{"id":"vWlifiy0ngvdeEl5Syyr","title":"Google Dorks","pathname":"/redteam/recon/google-dorks","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Reconnaissance"}]},{"id":"y3LZPZyqCaNqh4GS303j","title":"GitHub Recon","pathname":"/redteam/recon/open-source-code","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™  Data from Information Repositories - Technique T1213","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Reconnaissance"}]},{"id":"UHA2cKj5rfQ4PvL9p8tv","title":"Files Metadata","pathname":"/redteam/recon/files-metadata","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Reconnaissance"}]},{"id":"xcJUPu6S3OMtsSdAONAk","title":"Maltego","pathname":"/redteam/recon/maltego","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Reconnaissance"}]},{"id":"0V2hJjPP3kyJrXGjnNHB","title":"Specialized Search Engines","pathname":"/redteam/recon/specialized-search-engines","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Reconnaissance"}]},{"id":"JKst63O3rPm0xvuqtuh7","title":"Execution","pathname":"/redteam/weapon","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Execution - Tactic TA0002","breadcrumbs":[{"label":"Red-Teaming"}]},{"id":"pO7kFFTDCyPzCw6r37yC","title":"Code & Process Injection","pathname":"/redteam/weapon/code-and-process-injection","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Execution"}]},{"id":"VY2OLlCeaoL7I7MMc9AW","title":"Loading .NET Reflective Assembly","pathname":"/redteam/weapon/code-and-process-injection/.net-reflective-assembly","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Reflective Code Loading - Technique T1620","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Execution"},{"label":"Code & Process Injection"}]},{"id":"H3L2t7Zb0s1ENFSagvyI","title":"Loading .NET Assembly from Windows Script Hosting","pathname":"/redteam/weapon/code-and-process-injection/.net-assembly-from-windows-script-hosting","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Reflective Code Loading - Technique T1620","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Execution"},{"label":"Code & Process Injection"}]},{"id":"d74WsFh4Zjh011FTJ1tf","title":"Process Hollowing","pathname":"/redteam/weapon/code-and-process-injection/process-hollowing","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Process Injection: Process Hollowing - Technique T1055.012","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Execution"},{"label":"Code & Process Injection"}]},{"id":"QBhAE7aC8bBiFT5ePfnt","title":"WndProc Callback Shellcode Execution","pathname":"/redteam/weapon/code-and-process-injection/wndproc-callback-shellcode-execution","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Execution"},{"label":"Code & Process Injection"}]},{"id":"S0aDBg5OXQmI7aWQu7D5","title":"Fibers Shellcode Execution","pathname":"/redteam/weapon/code-and-process-injection/fibers-shellcode-execution","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Execution"},{"label":"Code & Process Injection"}]},{"id":"EgkoqlI1LNc821pRYi9D","title":"Vector Exception Handler Shellcode Execution","pathname":"/redteam/weapon/code-and-process-injection/vector-exception-handler-shellcode-execution","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Execution"},{"label":"Code & Process Injection"}]},{"id":"KvX5swROoVcvX7YePD7c","title":"NtQueueApcThread & NtTestAlert Shellcode Execution","pathname":"/redteam/weapon/code-and-process-injection/ntqueueapcthread-and-nttestalert-shellcode-execution","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Process Injection: Asynchronous Procedure Call - Technique T1055.004","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Execution"},{"label":"Code & Process Injection"}]},{"id":"iDryc8xMUzY9oXiVtNIo","title":"Thread Pool Callback Shellcode Execution","pathname":"/redteam/weapon/code-and-process-injection/thread-pool-callback-shellcode-execution","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Execution"},{"label":"Code & Process Injection"}]},{"id":"wsI105PBywM8tmuO16l5","title":"Module Stomping Shellcode Injection","pathname":"/redteam/weapon/code-and-process-injection/module-stomping-shellcode-injection","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Execution"},{"label":"Code & Process Injection"}]},{"id":"rNKRnRuDsl3ReHh89F7u","title":"Remote .NET Assembly Loading through WaaSRemediation DCOM Abuse","pathname":"/redteam/weapon/code-and-process-injection/remote-.net-assembly-loading-through-waasremediation-dcom-abuse","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Execution"},{"label":"Code & Process Injection"}]},{"id":"LmxHyrz7l4vrbz1TDZW4","title":"DLL Injection","pathname":"/redteam/weapon/code-and-process-injection/dll-injection","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Execution"},{"label":"Code & Process Injection"}]},{"id":"KxWOO6lyFNFTcN02hsuY","title":"CreateRemoteThread Injection","pathname":"/redteam/weapon/code-and-process-injection/createremotethread-injection","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Execution"},{"label":"Code & Process Injection"}]},{"id":"rWWvX6cijbdPXurxvqGY","title":"Reflective DLL Injection","pathname":"/redteam/weapon/code-and-process-injection/reflective-dll-injection","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Execution"},{"label":"Code & Process Injection"}]},{"id":"2YrvYSY8Jnsmg8f9GBSU","title":"NtMapViewOfSection Injection","pathname":"/redteam/weapon/code-and-process-injection/ntmapviewofsection-injection","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Execution"},{"label":"Code & Process Injection"}]},{"id":"i9t9uwpAgAMeS5otlWdl","title":"SetWindowHookEx Injection","pathname":"/redteam/weapon/code-and-process-injection/setwindowhookex-injection","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Execution"},{"label":"Code & Process Injection"}]},{"id":"72R9Rt3cgRDz3Sgtjdc5","title":"PoolParty","pathname":"/redteam/weapon/code-and-process-injection/poolparty","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Execution"},{"label":"Code & Process Injection"}]},{"id":"np71HeMfUawy6KrXP7le","title":"MockingJay","pathname":"/redteam/weapon/code-and-process-injection/mockingjay","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Execution"},{"label":"Code & Process Injection"}]},{"id":"kGr3Tcn7oYT3FbUorcyo","title":"Code Execution","pathname":"/redteam/weapon/code-execution","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Execution"}]},{"id":"TPVZLkbC60vj04y6b9Bj","title":"CMSTP","pathname":"/redteam/weapon/code-execution/cmstp","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Execution"},{"label":"Code Execution"}]},{"id":"MLGjx8VCuAH30ECMRBFM","title":"MSBuild","pathname":"/redteam/weapon/code-execution/msbuild","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Execution"},{"label":"Code Execution"}]},{"id":"yujkrzAlTdMaLJ9hx0OJ","title":"MSHTA","pathname":"/redteam/weapon/code-execution/mshta","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Execution"},{"label":"Code Execution"}]},{"id":"eVvVpop1D1Qcd7Z0sNG0","title":"Microsoft Office Execution","pathname":"/redteam/weapon/code-execution/microsoft-office-execution","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Execution"},{"label":"Code Execution"}]},{"id":"BmuRh0rFWhBPyQkOv2tI","title":"Windows Script Host (WSH)","pathname":"/redteam/weapon/code-execution/wsh","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Execution"},{"label":"Code Execution"}]},{"id":"rZLrtHeRjvKZSeMnrllJ","title":"Outlook Home Page Abuse (Specula)","pathname":"/redteam/weapon/code-execution/outlook-home-page-abuse-specula","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Execution"},{"label":"Code Execution"}]},{"id":"pdA97vvhJhDiT0arOW7R","title":"Powershell Without Powershell.exe","pathname":"/redteam/weapon/code-execution/whithout-powershell","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Execution"},{"label":"Code Execution"}]},{"id":"o1wBo87mpf7DvgGdNAn1","title":"RegSrv32","pathname":"/redteam/weapon/code-execution/regsrv32","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Execution"},{"label":"Code Execution"}]},{"id":"ebd6xtIdEwrdb562Gbm3","title":"Scheduled Tasks","pathname":"/redteam/weapon/code-execution/scheduled-tasks","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™  Scheduled Task/Job  - Technique T1053.002","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Execution"},{"label":"Code Execution"}]},{"id":"NhemeNfA2lcnnjLCZHvm","title":"Services","pathname":"/redteam/weapon/code-execution/services","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™   System Services - Service Execution  - Technique T1569.002","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Execution"},{"label":"Code Execution"}]},{"id":"uDWZZ4NN5bKa9f84UtEy","title":"Windows Library Files","pathname":"/redteam/weapon/code-execution/windows-library-files","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Execution"},{"label":"Code Execution"}]},{"id":"0AEgz20JsRu4qXMETumo","title":"HTML Help Files","pathname":"/redteam/weapon/code-execution/html-help-files","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Execution"},{"label":"Code Execution"}]},{"id":"lWyGWxnKG0fO2MeObFm3","title":"WMI","pathname":"/redteam/weapon/code-execution/wmic","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™  Windows Management Instrumentation - Technique T1047","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Execution"},{"label":"Code Execution"}]},{"id":"XPR9cmswwGZ4uRqxASul","title":"Script Exploits","pathname":"/redteam/weapon/code-execution/script-exploits","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Execution"},{"label":"Code Execution"}]},{"id":"7UJ2psRvHM4ui3cqZMK1","title":"Sliver","pathname":"/redteam/weapon/code-execution/sliver","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Execution"},{"label":"Code Execution"}]},{"id":"rgK1hdEgm41JUsGm1x3A","title":"Initial Access","pathname":"/redteam/delivery","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Initial Access - Tactic TA0001","breadcrumbs":[{"label":"Red-Teaming"}]},{"id":"yX27Szqd6LBCQMSJXzzX","title":"Network Services","pathname":"/redteam/delivery/network-services","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Initial Access"}]},{"id":"yG98ZgyKMqWI41tmTEcA","title":"Password Attacks","pathname":"/redteam/delivery/password-attacks","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Initial Access"}]},{"id":"3CVwKvnfVUzvqpBZVvcU","title":"Phishing","pathname":"/redteam/delivery/phishing","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Initial Access"}]},{"id":"FwfJW5zaGsuKWSJ53eiw","title":"HTML Smuggling","pathname":"/redteam/delivery/phishing/html-smuggling","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Obfuscated Files or Information: HTML Smuggling - Technique T1027.006","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Initial Access"},{"label":"Phishing"}]},{"id":"BPbDRyKHpdw5hOQZCumZ","title":"Phishing with Calendars (.ICS Files)","pathname":"/redteam/delivery/phishing/phishing-with-calendars-.ics-files","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Initial Access"},{"label":"Phishing"}]},{"id":"8o0GdbqcXmXHz3oGbZGi","title":"Phishing With Microsoft Office","pathname":"/redteam/delivery/phishing/phishing-with-ms-office","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Initial Access"},{"label":"Phishing"}]},{"id":"GGoQE7ePXnk0AlUIuR1O","title":"MS Office - VBA (Macros)","pathname":"/redteam/delivery/phishing/phishing-with-ms-office/vba","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Initial Access"},{"label":"Phishing"},{"label":"Phishing With Microsoft Office"}]},{"id":"0eqhJJjZ6W1mhSsiDYrn","title":"MS Office - RTF Files RCE","pathname":"/redteam/delivery/phishing/phishing-with-ms-office/ms-word-rtf-files-rce","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Initial Access"},{"label":"Phishing"},{"label":"Phishing With Microsoft Office"}]},{"id":"Ij1oRLtWGXZjAQJCVlmD","title":"MS Office - Custom XML parts","pathname":"/redteam/delivery/phishing/phishing-with-ms-office/ms-office-custom-xml-parts","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Initial Access"},{"label":"Phishing"},{"label":"Phishing With Microsoft Office"}]},{"id":"Q9Nmkjs6E8bvQcuxYxDw","title":"MS Office - Excel 4.0 (XLM) Macros","pathname":"/redteam/delivery/phishing/phishing-with-ms-office/ms-office-excel-4.0-xlm-macros","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Initial Access"},{"label":"Phishing"},{"label":"Phishing With Microsoft Office"}]},{"id":"YQNoyum8m12cU7aAMHpq","title":"MS Office - VBA Stomping","pathname":"/redteam/delivery/phishing/phishing-with-ms-office/ms-office-vba-stomping","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"MITRE ATT&CK™ Hide Artifacts: VBA Stomping - Technique T1564.007","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Initial Access"},{"label":"Phishing"},{"label":"Phishing With Microsoft Office"}]},{"id":"gfjserfmmsHInTdsk0Z8","title":"MS Office - Remote Dotm Template Injection","pathname":"/redteam/delivery/phishing/phishing-with-ms-office/ms-office-remote-dotm-template-injection","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Initial Access"},{"label":"Phishing"},{"label":"Phishing With Microsoft Office"}]},{"id":"XDKi3dmb9ZGOM9mVTqJ4","title":"Phishing via Proxy","pathname":"/redteam/delivery/phishing/phishing-via-proxy","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Initial Access"},{"label":"Phishing"}]},{"id":"O53XmKYCwo2tmtLkasRm","title":"Adversary in the Middle (AitM) Phishing","pathname":"/redteam/delivery/phishing/phishing-via-proxy/adversary-in-the-middle-aitm-phishing","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Adversary-in-the-Middle - Technique T1557","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Initial Access"},{"label":"Phishing"},{"label":"Phishing via Proxy","emoji":"1f6e0"}]},{"id":"RQEoiiA8EDcvJr5B5WMt","title":"EvilGoPhish","pathname":"/redteam/delivery/phishing/phishing-via-proxy/adversary-in-the-middle-aitm-phishing/evilgophish","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Adversary-in-the-Middle - Technique T1557","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Initial Access"},{"label":"Phishing"},{"label":"Phishing via Proxy","emoji":"1f6e0"},{"label":"Adversary in the Middle (AitM) Phishing"}]},{"id":"T6Y74BruMugGS5eT3w4G","title":"Evilginx","pathname":"/redteam/delivery/phishing/phishing-via-proxy/adversary-in-the-middle-aitm-phishing/evilginx","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Adversary-in-the-Middle - Technique T1557","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Initial Access"},{"label":"Phishing"},{"label":"Phishing via Proxy","emoji":"1f6e0"},{"label":"Adversary in the Middle (AitM) Phishing"}]},{"id":"mLffcvXWMtjyFGpMWImi","title":"Muraena","pathname":"/redteam/delivery/phishing/phishing-via-proxy/adversary-in-the-middle-aitm-phishing/muraena","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Adversary-in-the-Middle - Technique T1557","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Initial Access"},{"label":"Phishing"},{"label":"Phishing via Proxy","emoji":"1f6e0"},{"label":"Adversary in the Middle (AitM) Phishing"}]},{"id":"TzOm0wBBjrlAPV8DZ7iZ","title":"Modlishka","pathname":"/redteam/delivery/phishing/phishing-via-proxy/adversary-in-the-middle-aitm-phishing/modlishka","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Adversary-in-the-Middle - Technique T1557","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Initial Access"},{"label":"Phishing"},{"label":"Phishing via Proxy","emoji":"1f6e0"},{"label":"Adversary in the Middle (AitM) Phishing"}]},{"id":"vwAjFmSpFRFtTItRGLqY","title":"Browser in the Middle (BitM) Phishing","pathname":"/redteam/delivery/phishing/phishing-via-proxy/browser-in-the-middle-bitm-phishing","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Initial Access"},{"label":"Phishing"},{"label":"Phishing via Proxy","emoji":"1f6e0"}]},{"id":"WJ7n1Py8jsyJIFCzurzU","title":"cuddlephish","pathname":"/redteam/delivery/phishing/phishing-via-proxy/browser-in-the-middle-bitm-phishing/cuddlephish","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Initial Access"},{"label":"Phishing"},{"label":"Phishing via Proxy","emoji":"1f6e0"},{"label":"Browser in the Middle (BitM) Phishing"}]},{"id":"jvG8y4FVyM0e0BJgEJ7m","title":"EvilnoVNC","pathname":"/redteam/delivery/phishing/phishing-via-proxy/browser-in-the-middle-bitm-phishing/evilnovnc","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Initial Access"},{"label":"Phishing"},{"label":"Phishing via Proxy","emoji":"1f6e0"},{"label":"Browser in the Middle (BitM) Phishing"}]},{"id":"Uv2v2jBmGHybwWVsE713","title":"Persistence","pathname":"/redteam/persistence","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Persistence - Tactic TA0003","breadcrumbs":[{"label":"Red-Teaming"}]},{"id":"VIvScmLe3NP1xM8PUeqt","title":"Active Directory","pathname":"/redteam/persistence/active-directory","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Persistence"}]},{"id":"QvqShLT8WO50zhgR00SL","title":"Windows","pathname":"/redteam/persistence/windows","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Persistence"}]},{"id":"85IGBz4FCVSSEM1x3Uk0","title":"Accessibility features Backdoor","pathname":"/redteam/persistence/windows/accessibility-features-backdoor","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™  Event Triggered Execution - Accessibility Features - Technique T1546.008","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Persistence"},{"label":"Windows"}]},{"id":"HbHMCMrHpECj6hAbFoYL","title":"AEDebug Keys Persistence","pathname":"/redteam/persistence/windows/aedebug-keys","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Persistence"},{"label":"Windows"}]},{"id":"jJ80JyCoszLufewTrXCQ","title":"Image File Execution Options (IFEO) Persistence","pathname":"/redteam/persistence/windows/image-file-execution-options","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Event Triggered Execution: Image File Execution Options Injection - Technique T1546.012","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Persistence"},{"label":"Windows"}]},{"id":"zBNIIvG6ZEkU4Mh2tfOb","title":"Logon Triggered Persistence","pathname":"/redteam/persistence/windows/logon-triggered","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Boot or Logon Autostart Execution - Technique T1547","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Persistence"},{"label":"Windows"}]},{"id":"DREvaKj0fYOKNIDf0dfZ","title":"LSA Persistence","pathname":"/redteam/persistence/windows/lsa","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Persistence"},{"label":"Windows"}]},{"id":"nDJti97wHGmnDEdUozll","title":"Security Support Provider DLLs","pathname":"/redteam/persistence/windows/lsa/security-support-provider-dlls","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Boot or Logon Autostart Execution: Security Support Provider - Technique T1547.005","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Persistence"},{"label":"Windows"},{"label":"LSA Persistence"}]},{"id":"54ObOZg4vknDbdg4ExXq","title":"Authentication Package","pathname":"/redteam/persistence/windows/lsa/authentication-package","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Boot or Logon Autostart Execution: Authentication Package - Technique T1547.002","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Persistence"},{"label":"Windows"},{"label":"LSA Persistence"}]},{"id":"yb4z8IPATV33wJ71QUe0","title":"Natural Language 6 DLLs Persistence","pathname":"/redteam/persistence/windows/natural-language-6-dlls","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Persistence"},{"label":"Windows"}]},{"id":"3XEI6YllyTFLDdqXo9zk","title":"Run Keys Persistence","pathname":"/redteam/persistence/windows/run-keys","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder - Technique T1547.001","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Persistence"},{"label":"Windows"}]},{"id":"y4sMJUnoDrfqbeSMGumk","title":"Winlogon Persistence","pathname":"/redteam/persistence/windows/winlogon","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Boot or Logon Autostart Execution: Winlogon Helper DLL - Technique T1547.001","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Persistence"},{"label":"Windows"}]},{"id":"EVTbUqOnGNQDeq5iwoix","title":"WMI Event Subscription Persistence","pathname":"/redteam/persistence/windows/wmi-event-subscription","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™  Event Triggered Execution: Windows Management Instrumentation Event Subscription - Technique T1546.003","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Persistence"},{"label":"Windows"}]},{"id":"xu5PuSXWaX5xmgm9faMd","title":"Linux","pathname":"/redteam/persistence/linux","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Persistence"}]},{"id":"Uhza9NInHAZqPNTsaBLf","title":"SSH for Persistence","pathname":"/redteam/persistence/linux/ssh","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Persistence - Tactic TA0003","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Persistence"},{"label":"Linux"}]},{"id":"YYj5wm4bauVeXHEpjIcq","title":"GSocket for Persistence","pathname":"/redteam/persistence/linux/gsocket-for-persistence","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Persistence - Tactic TA0003","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Persistence"},{"label":"Linux"}]},{"id":"1jfYrvSOHTupYFAgDMya","title":"Udev rules","pathname":"/redteam/persistence/linux/udev-rules","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Persistence"},{"label":"Linux"}]},{"id":"gH5hecd994bFg8jfWrqi","title":"Defense Evasion","pathname":"/redteam/evasion","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Defense Evasion - Tactic TA0005","breadcrumbs":[{"label":"Red-Teaming"}]},{"id":"JW5yJS1iZsAjRq1Uqi8Q","title":"Endpoint Detection Respons (EDR) Bypass","pathname":"/redteam/evasion/endpoint-detection-respons-edr-bypass","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Defense Evasion"}]},{"id":"duNjTi1L32CeKuciVQJL","title":"Bring Your Own Vulnerable Driver (BYOVD)","pathname":"/redteam/evasion/endpoint-detection-respons-edr-bypass/bring-your-own-vulnerable-driver-byovd","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Exploitation for Privilege Escalation - Technique T1068","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Defense Evasion"},{"label":"Endpoint Detection Respons (EDR) Bypass"}]},{"id":"kzv8DjorYhnmHTE5OwnL","title":"Safe Mode With Networking","pathname":"/redteam/evasion/endpoint-detection-respons-edr-bypass/safe-mode-with-networking","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Impair Defenses: Disable or Modify Tools - Technique T1562.001","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Defense Evasion"},{"label":"Endpoint Detection Respons (EDR) Bypass"}]},{"id":"vAivORYRlAjENgouad7M","title":"Windows Defender Application Control (WDAC): Killing EDR","pathname":"/redteam/evasion/endpoint-detection-respons-edr-bypass/windows-defender-application-control-wdac-killing-edr","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Impair Defenses: Disable or Modify Tools - Technique T1562.001","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Defense Evasion"},{"label":"Endpoint Detection Respons (EDR) Bypass"}]},{"id":"7YKR0HT3vY1yXIf33Yfc","title":"Load Unsigned Drivers","pathname":"/redteam/evasion/endpoint-detection-respons-edr-bypass/load-unsigned-drivers","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Defense Evasion"},{"label":"Endpoint Detection Respons (EDR) Bypass"}]},{"id":"zlBDXk8E5Fq9Flf7j94X","title":"Minifilter Altitude","pathname":"/redteam/evasion/endpoint-detection-respons-edr-bypass/minifilter-altitude","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Defense Evasion"},{"label":"Endpoint Detection Respons (EDR) Bypass"}]},{"id":"fig8lLWDHPtQ6k1jQMuv","title":"Hypervisor Code Integrity (HVCI) Disallowed Images","pathname":"/redteam/evasion/endpoint-detection-respons-edr-bypass/hypervisor-code-integrity-hvci-disallowed-images","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Defense Evasion"},{"label":"Endpoint Detection Respons (EDR) Bypass"}]},{"id":"dneVaxy7rv3mOHl3btHT","title":"Windows Filtering Platform (WFP)","pathname":"/redteam/evasion/endpoint-detection-respons-edr-bypass/windows-filtering-platform-wfp","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Defense Evasion"},{"label":"Endpoint Detection Respons (EDR) Bypass"}]},{"id":"eR49SKOi4TDKKnaolW4O","title":"Userland Hooking Bypass","pathname":"/redteam/evasion/endpoint-detection-respons-edr-bypass/userland-hooking-bypass","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Defense Evasion"},{"label":"Endpoint Detection Respons (EDR) Bypass"}]},{"id":"IkoncAVash3mWVA26TPi","title":"UAC Bypass","pathname":"/redteam/evasion/uac","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Impair Defenses: Disable or Modify Tools - Technique T1562.001","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Defense Evasion"}]},{"id":"W2GWO9igfFBBkQBM47SJ","title":"AMSI Bypass","pathname":"/redteam/evasion/amsi","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Impair Defenses: Disable or Modify Tools - Technique T1562.001","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Defense Evasion"}]},{"id":"Vjg8Yc2zfzf4co8ovDDL","title":"ETW evasion","pathname":"/redteam/evasion/etw-evasion","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Impair Defenses: Disable or Modify Tools - Technique T1562.002","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Defense Evasion"}]},{"id":"8SNfqfkkDUOhWtiToig2","title":"Living Off The Land","pathname":"/redteam/evasion/living-off-the-land","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Defense Evasion"}]},{"id":"jcO854rMeADaxUm6noQY","title":"Windows Sysinternals","pathname":"/redteam/evasion/living-off-the-land/sysinternals","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Defense Evasion"},{"label":"Living Off The Land"}]},{"id":"k1nilBwshj1AbugmwPF0","title":"LOLBAS Project","pathname":"/redteam/evasion/living-off-the-land/lolbas","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Defense Evasion"},{"label":"Living Off The Land"}]},{"id":"2XU0OKFyWkOHIXFkfb99","title":"File Operations","pathname":"/redteam/evasion/living-off-the-land/file-operations","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Defense Evasion"},{"label":"Living Off The Land"}]},{"id":"HVuYl7uB5Uv5gLFrKCEM","title":"File Executions","pathname":"/redteam/evasion/living-off-the-land/file-executions","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Defense Evasion"},{"label":"Living Off The Land"}]},{"id":"W6Z5McyVheE2cgd8fYV6","title":"Signature Evasion","pathname":"/redteam/evasion/signature-evasion","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Defense Evasion"}]},{"id":"cgiPOg2VVo2ut8BWwFTO","title":"Obfuscation","pathname":"/redteam/evasion/obf","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Defense Evasion"}]},{"id":"vUmbZnmQ1pQHJNIT95K4","title":"PowerShell Obfuscation","pathname":"/redteam/evasion/obf/powershell-obfuscation","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Defense Evasion"},{"label":"Obfuscation"}]},{"id":"4ABrbjcjn7FOdoImX2if","title":"Commandline Obfusaction","pathname":"/redteam/evasion/obf/commandline-obfusaction","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Defense Evasion"},{"label":"Obfuscation"}]},{"id":"0e2VQ6OP6zHG5WbfAYnv","title":"PE Obfuscation","pathname":"/redteam/evasion/obf/pe-obfuscation","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Defense Evasion"},{"label":"Obfuscation"}]},{"id":"8CBYZdyX21kVAbdi15eP","title":"String Encryption","pathname":"/redteam/evasion/obf/string-encryption","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Defense Evasion"},{"label":"Obfuscation"}]},{"id":"JaqBK0HbzhlaUSIA0Nmd","title":"AppLocker Bypass","pathname":"/redteam/evasion/applocker-bypass","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Defense Evasion"}]},{"id":"sMa8j3ezB6nJdoM43lNY","title":"Mark-of-the-Web (MotW) Bypass","pathname":"/redteam/evasion/motw-bypass","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™  Subvert Trust Controls: Mark-of-the-Web Bypass - Technique T1553.005","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Defense Evasion"}]},{"id":"lMGayheYdfhThEdzS8PT","title":"PowerShell Constrained Language Mode (CLM) Bypass","pathname":"/redteam/evasion/powershell-constrained-language-mode-clm-bypass","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Defense Evasion"}]},{"id":"LGL167fjJkzy9irF69IX","title":"Kill Windows Defender","pathname":"/redteam/evasion/kill-windows-defender","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Defense Evasion"}]},{"id":"c9Se9vcxd9gZMlzEEOhQ","title":"Virtualization-based security (VBS) Bypass","pathname":"/redteam/evasion/virtualization-based-security-vbs-bypass","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Defense Evasion"}]},{"id":"bF2nPaUSPHIzZ9sCTnjM","title":"Credential Guard bypass","pathname":"/redteam/evasion/virtualization-based-security-vbs-bypass/credential-guard-bypass","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Defense Evasion"},{"label":"Virtualization-based security (VBS) Bypass","emoji":"1f6e0"}]},{"id":"k8R21FOL8bxtWRqUZTCu","title":"hypervisor-protected code integrity (HVCI) Bypass","pathname":"/redteam/evasion/virtualization-based-security-vbs-bypass/hypervisor-protected-code-integrity-hvci-bypass","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Defense Evasion"},{"label":"Virtualization-based security (VBS) Bypass","emoji":"1f6e0"}]},{"id":"zI9SIK7N0tm9limtlbrn","title":"Windows Defender Application Control (WDAC) Bypass","pathname":"/redteam/evasion/virtualization-based-security-vbs-bypass/windows-defender-application-control-wdac-bypass","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Defense Evasion"},{"label":"Virtualization-based security (VBS) Bypass","emoji":"1f6e0"}]},{"id":"w9aT2CLZJeBZdQ3R1RPs","title":"Sandbox Evasion","pathname":"/redteam/evasion/sandbox-evasion","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"MITRE ATT&CK™ Virtualization/Sandbox Evasion- Technique T1497","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Defense Evasion"}]},{"id":"XbD6qAISrBN0Xm1p2btF","title":"Discovery","pathname":"/redteam/discovery","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Discovery - Tactic TA0007","breadcrumbs":[{"label":"Red-Teaming"}]},{"id":"oqGfOsblW3ArhxGt3Alm","title":"Active Directory","pathname":"/redteam/discovery/active-directory","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Discovery"}]},{"id":"KyPNVvHoKgVNL9bbRvgb","title":"Windows","pathname":"/redteam/discovery/windows","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Discovery"}]},{"id":"B55XpRi39EazPprG1N11","title":"System Information","pathname":"/redteam/discovery/windows/system-information","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™  System Information Discovery - Technique T1082","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Discovery"},{"label":"Windows"}]},{"id":"MVREys7HJHUfzFtEbROm","title":"Processes & Services","pathname":"/redteam/discovery/windows/processes-and-services","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™  Process Discovery & System Service Discovery  - Technique T1057 & T1007","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Discovery"},{"label":"Windows"}]},{"id":"uvpowoWsdqO5DZKWYIqG","title":"Scheduled Tasks","pathname":"/redteam/discovery/windows/scheduled-tasks","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Discovery"},{"label":"Windows"}]},{"id":"W7WpalmBSN23UWEteu2y","title":"Installed applications","pathname":"/redteam/discovery/windows/installed-applications","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Software Discovery - Technique T1518","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Discovery"},{"label":"Windows"}]},{"id":"WX5W4AVn7UHa2qW10TkX","title":"Network Configuration","pathname":"/redteam/discovery/windows/network-configuration","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ System Network Configuration Discovery - Technique T1016","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Discovery"},{"label":"Windows"}]},{"id":"K6YNAJjgo5yWai5NTQ9z","title":"FIle/Folder ACLs","pathname":"/redteam/discovery/windows/acls","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ File and Directory Discovery - Technique T1083","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Discovery"},{"label":"Windows"}]},{"id":"tJdYTKBykyzfIMstFFoj","title":"Knowing your Shell","pathname":"/redteam/discovery/windows/knowing-your-shell","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Discovery"},{"label":"Windows"}]},{"id":"0mYxOJi7xWN1Gzqzy7cD","title":"Security Solutions","pathname":"/redteam/discovery/windows/av","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Software Discovery: Security Software Discovery - Technique T1518.001","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Discovery"},{"label":"Windows"}]},{"id":"oqAHrCXJq4tESG9DllNK","title":"Linux","pathname":"/redteam/discovery/linux","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Discovery"}]},{"id":"dUWIgYKRfmRE9rcaDPf3","title":"OS Details","pathname":"/redteam/discovery/linux/os-details","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Discovery"},{"label":"Linux"}]},{"id":"CBptyhYJ04KIryeLdG5e","title":"Process & Services","pathname":"/redteam/discovery/linux/process-and-services","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Discovery"},{"label":"Linux"}]},{"id":"ClFTNFYo25OW4XjN7s6q","title":"Privilege Escalation","pathname":"/redteam/privilege-escalation","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Privilege Escalation  - Tactic TA0004","breadcrumbs":[{"label":"Red-Teaming"}]},{"id":"pcYRdh29o1tKok9Nf9gz","title":"Windows","pathname":"/redteam/privilege-escalation/windows","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"}]},{"id":"UDXODsfo0k36hvTt3XnX","title":"Tools ⚙️","pathname":"/redteam/privilege-escalation/windows/tools","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Windows"}]},{"id":"R2NNunPLl4OyWUf4fi9z","title":"Unsecured Credentials","pathname":"/redteam/privilege-escalation/windows/credentials-in-files","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™  Unsecured Credentials: Credentials In Files - Technique T1552.001","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Windows"}]},{"id":"Icb7RdCzAodCTBDyjN5O","title":"Abusing Tokens","pathname":"/redteam/privilege-escalation/windows/abusing-tokens","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Windows"}]},{"id":"U6Gf2qrzynW6HE7GnzrA","title":"Insecure Services","pathname":"/redteam/privilege-escalation/windows/services","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™  Hijack Execution Flow - Technique T1574","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Windows"}]},{"id":"w2MynVqegWVN7AWC2P0U","title":"Weak Service Permissions","pathname":"/redteam/privilege-escalation/windows/services/weak-service-permissions","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Hijack Execution Flow - Technique T1574","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Windows"},{"label":"Insecure Services"}]},{"id":"Lh3oJZNgPTDfxODCTEyO","title":"Weak File/Folder Permissions","pathname":"/redteam/privilege-escalation/windows/services/weak-files-permissions","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Hijack Execution Flow - Technique T1574","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Windows"},{"label":"Insecure Services"}]},{"id":"gVgEvnI3smFFofh7oL4B","title":"Weak Registry Permissions","pathname":"/redteam/privilege-escalation/windows/services/weak-registry-permissions","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Hijack Execution Flow - Services Registry Permissions Weakness - Technique T1574.011","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Windows"},{"label":"Insecure Services"}]},{"id":"X7FhjVNN8VwEB1gg4xZW","title":"Unquoted Service Path","pathname":"/redteam/privilege-escalation/windows/services/unquoted-service-path","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Hijack Execution Flow - Path Interception by Unquoted Path - Technique T1574.09","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Windows"},{"label":"Insecure Services"}]},{"id":"t0S0BEpIQudOjnmrTfxX","title":"AlwaysInstallElevated","pathname":"/redteam/privilege-escalation/windows/alwaysinstallelevated","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™  System Binary Proxy Execution: Msiexec - Technique T1218.007","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Windows"}]},{"id":"43tLPPTmiFt7Lp2Wz17m","title":"AutoLogon Registry","pathname":"/redteam/privilege-escalation/windows/autologon-registry","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Windows"}]},{"id":"H6XIpBZLSfrQlwP6uzC9","title":"Insecure Scheduled Tasks","pathname":"/redteam/privilege-escalation/windows/insecure-scheduled-tasks","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Windows"}]},{"id":"qAcIv4W0MScGT988s5ZO","title":"Weak File/Folder Permissions","pathname":"/redteam/privilege-escalation/windows/insecure-scheduled-tasks/weak-file-folder-permissions","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Windows"},{"label":"Insecure Scheduled Tasks"}]},{"id":"05EVVIy93LJM9QMxSbt4","title":"DLL Hijacking","pathname":"/redteam/privilege-escalation/windows/dll-hijacking","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Windows"}]},{"id":"rdOaQWLQkkmAhoozRQ70","title":"Linux","pathname":"/redteam/privilege-escalation/linux","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"}]},{"id":"bqNMoIrLk99bmhUMIApq","title":"Kernel Exploits","pathname":"/redteam/privilege-escalation/linux/kernel-exploits","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Linux"}]},{"id":"SKSyNNXpDo8r3HjRPuVB","title":"OverlayFs Exploits","pathname":"/redteam/privilege-escalation/linux/kernel-exploits/overlayfs-exploits","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Linux"},{"label":"Kernel Exploits"}]},{"id":"Gm4Eb0nVkaRDHnXCrecq","title":"GameOverlayFs","pathname":"/redteam/privilege-escalation/linux/kernel-exploits/overlayfs-exploits/gameoverlayfs","siteSpaceId":"sitesp_6kTLM","description":"CVE-2023-2640 & CVE-2023-32629","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Linux"},{"label":"Kernel Exploits"},{"label":"OverlayFs Exploits"}]},{"id":"HiT0NYP2sCeBn54CCbug","title":"CVE-2023-0386","pathname":"/redteam/privilege-escalation/linux/kernel-exploits/overlayfs-exploits/cve-2023-0386-overlayfs","siteSpaceId":"sitesp_6kTLM","description":"CVE-2023-0386","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Linux"},{"label":"Kernel Exploits"},{"label":"OverlayFs Exploits"}]},{"id":"aVWe6uu5ooiTK7aQQJFC","title":"CVE-2021-3493","pathname":"/redteam/privilege-escalation/linux/kernel-exploits/overlayfs-exploits/cve-2021-3493","siteSpaceId":"sitesp_6kTLM","description":"CVE-2021-3493","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Linux"},{"label":"Kernel Exploits"},{"label":"OverlayFs Exploits"}]},{"id":"ij19UHQVPb0xydgnZDU2","title":"CVE-2023-32233 (CAP_NET_ADMIN)","pathname":"/redteam/privilege-escalation/linux/kernel-exploits/nf_tables","siteSpaceId":"sitesp_6kTLM","description":"CVE-2023-32233","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Linux"},{"label":"Kernel Exploits"}]},{"id":"bhZ0CbKyTJAWGO0pqCaL","title":"Dirty Pipe","pathname":"/redteam/privilege-escalation/linux/kernel-exploits/dirtypipe","siteSpaceId":"sitesp_6kTLM","description":"CVE-2022-0847","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Linux"},{"label":"Kernel Exploits"}]},{"id":"K6zvs1VkqTpTI2cFVbtR","title":"DirtyCow","pathname":"/redteam/privilege-escalation/linux/kernel-exploits/dirtycow","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Linux"},{"label":"Kernel Exploits"}]},{"id":"RtYFpnnqASlCUGRRQd2u","title":"RDS","pathname":"/redteam/privilege-escalation/linux/kernel-exploits/rds","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Linux"},{"label":"Kernel Exploits"}]},{"id":"hk52rBeiFnP4vI5gink9","title":"Full Nelson","pathname":"/redteam/privilege-escalation/linux/kernel-exploits/full-nelson","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Linux"},{"label":"Kernel Exploits"}]},{"id":"kxtmHhNT05K3g0k9oEJr","title":"Mempodipper","pathname":"/redteam/privilege-escalation/linux/kernel-exploits/mempodipper","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Linux"},{"label":"Kernel Exploits"}]},{"id":"P1oSMMujIErS6XWgzGFI","title":"GLIBC Exploits","pathname":"/redteam/privilege-escalation/linux/glibc-exploits","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Linux"}]},{"id":"Yj3Kuic2dsFZaAEHi21e","title":"Looney Tunables","pathname":"/redteam/privilege-escalation/linux/glibc-exploits/looney-tunables","siteSpaceId":"sitesp_6kTLM","description":"CVE-2023-4911","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Linux"},{"label":"GLIBC Exploits"}]},{"id":"RwmNWy3Y4wYrTv4OX5gz","title":"Polkit Exploits","pathname":"/redteam/privilege-escalation/linux/polkit-exploits","siteSpaceId":"sitesp_6kTLM","description":"Privilege Escalation","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Linux"}]},{"id":"M4H43eNqIUHc2MJ0P8Z6","title":"PwnKit","pathname":"/redteam/privilege-escalation/linux/polkit-exploits/pwnkit","siteSpaceId":"sitesp_6kTLM","description":"CVE-2021-4034","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Linux"},{"label":"Polkit Exploits"}]},{"id":"e4Yd747GNK1eYXnF4GC6","title":"D-Bus Authentication Bypass","pathname":"/redteam/privilege-escalation/linux/polkit-exploits/d-bus-authentication-bypass","siteSpaceId":"sitesp_6kTLM","description":"CVE-2021-3560","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Linux"},{"label":"Polkit Exploits"}]},{"id":"wZC0vut4d14gUV4oPqto","title":"Sudo Exploits","pathname":"/redteam/privilege-escalation/linux/sudo-exploits","siteSpaceId":"sitesp_6kTLM","description":"Privilege Escalation","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Linux"}]},{"id":"IBclqVNppS67Z25NigOP","title":"Sudo Binaries","pathname":"/redteam/privilege-escalation/linux/sudo-exploits/sudo-binaries","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Linux"},{"label":"Sudo Exploits"}]},{"id":"zPjQgdBtiI0AzGbYox0D","title":"Sudo Misconfigurations","pathname":"/redteam/privilege-escalation/linux/sudo-exploits/sudo-misconfigurations","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Linux"},{"label":"Sudo Exploits"}]},{"id":"nR3NvNBTlhf10437A31X","title":"Reuse Sudo Tokens","pathname":"/redteam/privilege-escalation/linux/sudo-exploits/reuse-sudo-tokens","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Linux"},{"label":"Sudo Exploits"}]},{"id":"yKo4w4CjVpCLWlFO5GvD","title":"User Restriction Bypass","pathname":"/redteam/privilege-escalation/linux/sudo-exploits/bypass-of-user-restrictions","siteSpaceId":"sitesp_6kTLM","description":"CVE-2019-14287","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Linux"},{"label":"Sudo Exploits"}]},{"id":"gcu8S542rI9YLBmdhdTF","title":"Pwfeedback BOF","pathname":"/redteam/privilege-escalation/linux/sudo-exploits/pwfeedback-bof","siteSpaceId":"sitesp_6kTLM","description":"CVE-2019-18634","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Linux"},{"label":"Sudo Exploits"}]},{"id":"RSn6sXa8ceUoI2YuCu6e","title":"Baron Samedit","pathname":"/redteam/privilege-escalation/linux/sudo-exploits/sudo-baron-samedit","siteSpaceId":"sitesp_6kTLM","description":"CVE-2021–3156","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Linux"},{"label":"Sudo Exploits"}]},{"id":"KbjHFZyy6LprHcgSqpuV","title":"Sudoedit Bypass","pathname":"/redteam/privilege-escalation/linux/sudo-exploits/sudoedit-bypass","siteSpaceId":"sitesp_6kTLM","description":"CVE-2023-22809","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Linux"},{"label":"Sudo Exploits"}]},{"id":"rydNzkYLaTGBs7aq4Jn7","title":"SUID Binaries","pathname":"/redteam/privilege-escalation/linux/suid-binaries","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Linux"}]},{"id":"tOUfSnDGdeu3ZxGsR6f8","title":"Script Exploits","pathname":"/redteam/privilege-escalation/linux/script-exploits","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Linux"}]},{"id":"KqLJOSOtGUGuIsObEjbg","title":"Python","pathname":"/redteam/privilege-escalation/linux/script-exploits/python","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Linux"},{"label":"Script Exploits"}]},{"id":"fNpoYqrh7jppILtwiJK9","title":"Pip Download Code Execution","pathname":"/redteam/privilege-escalation/linux/script-exploits/python/pypi-package","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Linux"},{"label":"Script Exploits"},{"label":"Python"}]},{"id":"aEvi0V2ESkCpNd6XELnc","title":"PyInstaller Code Execution","pathname":"/redteam/privilege-escalation/linux/script-exploits/python/pyinstaller","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Linux"},{"label":"Script Exploits"},{"label":"Python"}]},{"id":"DVV9qH7SkEgLSJEfWbJE","title":"Pytorch Models/PTH Files Code Execution","pathname":"/redteam/privilege-escalation/linux/script-exploits/python/pytorch-models-pth-files-code-execution","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Linux"},{"label":"Script Exploits"},{"label":"Python"}]},{"id":"ewx9XPkDcTYzhFd3FYri","title":"Ruby","pathname":"/redteam/privilege-escalation/linux/script-exploits/ruby","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Linux"},{"label":"Script Exploits"}]},{"id":"xGMJUcMRlXHNggLnKSnU","title":"Bash","pathname":"/redteam/privilege-escalation/linux/script-exploits/bash","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Linux"},{"label":"Script Exploits"}]},{"id":"rhRn5uO3nht4rRg00Dul","title":"Perl","pathname":"/redteam/privilege-escalation/linux/script-exploits/perl","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Linux"},{"label":"Script Exploits"}]},{"id":"Z2yjade7cNmcLSrK99PQ","title":"Scheduled tasks","pathname":"/redteam/privilege-escalation/linux/scheduled-tasks","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Linux"}]},{"id":"lf0qByNy96nyxoPWgRmh","title":"Cron Jobs","pathname":"/redteam/privilege-escalation/linux/scheduled-tasks/cron-jobs","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Linux"},{"label":"Scheduled tasks"}]},{"id":"5whZuLoA9NoPif6xyJPQ","title":"Systemd timers","pathname":"/redteam/privilege-escalation/linux/scheduled-tasks/systemd-timers","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Linux"},{"label":"Scheduled tasks"}]},{"id":"A7N9UVYf71WOM3bDjaGe","title":"Interesting Groups","pathname":"/redteam/privilege-escalation/linux/groups","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Linux"}]},{"id":"ktWvGIVyBC12vc6fLdJE","title":"Lxd","pathname":"/redteam/privilege-escalation/linux/groups/lxd","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Linux"},{"label":"Interesting Groups"}]},{"id":"oHfKOZtoyKUiXBP5jI3z","title":"Capabilities","pathname":"/redteam/privilege-escalation/linux/capabilities","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Linux"}]},{"id":"Tor6xRZJdtn1cWTwDopv","title":"NFS no_root_squash/no_all_squash","pathname":"/redteam/privilege-escalation/linux/nfs-no_root_squash-no_all_squash","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Linux"}]},{"id":"lXIu4ulzYva5Hkk406Y7","title":"Linux Active Directory","pathname":"/redteam/privilege-escalation/linux/linux-active-directory","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Privilege Escalation"},{"label":"Linux"}]},{"id":"PTcp9eokb0uDCiU6Yopp","title":"Credential Access","pathname":"/redteam/credentials","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Credential Access - Tactic TA0006","breadcrumbs":[{"label":"Red-Teaming"}]},{"id":"kbweO2GuElMs3ZUEwMAH","title":"Password Stores","pathname":"/redteam/credentials/password-stores","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Credential Access"}]},{"id":"g4xFBEpqwHtU8Qeq57M2","title":"Windows Credential Manager","pathname":"/redteam/credentials/password-stores/windows-credential-manager","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Credential Access"},{"label":"Password Stores"}]},{"id":"2OAn4MaCyqTp5G28U2LH","title":"KeePass","pathname":"/redteam/credentials/password-stores/keepass","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Credentials from Password Stores: Password Managers - Technique T1555.005","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Credential Access"},{"label":"Password Stores"}]},{"id":"r3SRcyppuAhybBJsilTp","title":"Web Browsers","pathname":"/redteam/credentials/password-stores/credentials-from-web-browsers","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™  Credentials from Password Stores: Credentials from Web Browsers  - Technique T1555.003","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Credential Access"},{"label":"Password Stores"}]},{"id":"FNx7Z7UmHuFYi1BApMho","title":"Unsecured Credentials","pathname":"/redteam/credentials/unsecured-credentials","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Credential Access"}]},{"id":"8BYq3XjTfQoAtVR92TYE","title":"Credentials In Files","pathname":"/redteam/credentials/unsecured-credentials/credentials-in-files","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Unsecured Credentials: Credentials In Files - Technique T1552.00","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Credential Access"},{"label":"Unsecured Credentials"}]},{"id":"cnS2MxeOIzbLZ7sIBrPJ","title":"PowerShell Credentials","pathname":"/redteam/credentials/unsecured-credentials/powershell-logging","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™  Unsecured Credentials - Technique T1552","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Credential Access"},{"label":"Unsecured Credentials"}]},{"id":"yzTAce7jwkrYpigqcoMy","title":"VNC Config","pathname":"/redteam/credentials/unsecured-credentials/vnc-config","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Unsecured Credentials: Credentials In Files - Technique T1552.00","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Credential Access"},{"label":"Unsecured Credentials"}]},{"id":"l7kcOkq3RuaEpWzuxVzj","title":"SSH Private Keys","pathname":"/redteam/credentials/unsecured-credentials/ssh-private-keys","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Unsecured Credentials: Private Keys - T1552.004","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Credential Access"},{"label":"Unsecured Credentials"}]},{"id":"znnE2Gjb6zSXVOGlDkSO","title":"Git Repositories","pathname":"/redteam/credentials/unsecured-credentials/git-repositories","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Credential Access"},{"label":"Unsecured Credentials"}]},{"id":"plByjf0Oefa2PHzk7F3f","title":"Veeam Backup","pathname":"/redteam/credentials/unsecured-credentials/veeam-backup","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Credential Access - Tactic TA0006","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Credential Access"},{"label":"Unsecured Credentials"}]},{"id":"Adg7EpwNYKZSg3wrAoXP","title":"Network shares","pathname":"/redteam/credentials/unsecured-credentials/network-shares","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Credential Access"},{"label":"Unsecured Credentials"}]},{"id":"Q9V2CI7K6POJAzFvq66k","title":"Cred Network protocols","pathname":"/redteam/credentials/unsecured-credentials/network-protocols","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Credential Access"},{"label":"Unsecured Credentials"}]},{"id":"rWtgaCWFzL3Iuclund8T","title":"OS Credentials","pathname":"/redteam/credentials/os-credentials","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Credential Access"}]},{"id":"vH9BaMfpXHmzHUaBAb7f","title":"Windows & Active Directory","pathname":"/redteam/credentials/os-credentials/windows-and-active-directory","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ OS Credential Dumping - Technique T1003","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Credential Access"},{"label":"OS Credentials"}]},{"id":"wwrmPtW710cjG2CA7wdh","title":"SAM & LSA secrets","pathname":"/redteam/credentials/os-credentials/windows-and-active-directory/sam-and-lsa-secrets","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Sub-techniques T1003.002, T1003.004 and T1003.005","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Credential Access"},{"label":"OS Credentials"},{"label":"Windows & Active Directory"}]},{"id":"xzkdHrL21LHi1yFzb2Lq","title":"DPAPI secrets","pathname":"/redteam/credentials/os-credentials/windows-and-active-directory/dpapi-protected-secrets","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Sub-technique T1555.003","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Credential Access"},{"label":"OS Credentials"},{"label":"Windows & Active Directory"}]},{"id":"xPCzK58JL0QfDqKPhRWa","title":"NTDS secrets","pathname":"/redteam/credentials/os-credentials/windows-and-active-directory/ntds","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Sub-technique T1003.003","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Credential Access"},{"label":"OS Credentials"},{"label":"Windows & Active Directory"}]},{"id":"4oHfMg2xbSXb4rHynnR6","title":"LSASS secrets","pathname":"/redteam/credentials/os-credentials/windows-and-active-directory/lsass","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Sub-technique T1003.001","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Credential Access"},{"label":"OS Credentials"},{"label":"Windows & Active Directory"}]},{"id":"mKpMF7DTqZ4d5s1Ibv2F","title":"DCSync","pathname":"/redteam/credentials/os-credentials/windows-and-active-directory/dcsync","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Sub-technique T1003.006","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Credential Access"},{"label":"OS Credentials"},{"label":"Windows & Active Directory"}]},{"id":"u3cUWB2c5Q8728WNXuxf","title":"Kerberos key list","pathname":"/redteam/credentials/os-credentials/windows-and-active-directory/kerberos-key-list","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Credential Access"},{"label":"OS Credentials"},{"label":"Windows & Active Directory"}]},{"id":"c0m7VKA97xdcvLf2lnM3","title":"Group Policy Preferences","pathname":"/redteam/credentials/os-credentials/windows-and-active-directory/group-policies-preferences","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Sub-technique T1552.006","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Credential Access"},{"label":"OS Credentials"},{"label":"Windows & Active Directory"}]},{"id":"wT0XR1Ty0dBGFkNitQnh","title":"AutoLogon Registry","pathname":"/redteam/credentials/os-credentials/windows-and-active-directory/autologon-registry","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Credential Access"},{"label":"OS Credentials"},{"label":"Windows & Active Directory"}]},{"id":"dnQPSbuzCYul5VWPWmPH","title":"In-memory secrets","pathname":"/redteam/credentials/os-credentials/windows-and-active-directory/passwords-in-memory","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Credential Access"},{"label":"OS Credentials"},{"label":"Windows & Active Directory"}]},{"id":"uU85R3oZ3c0ccsrLCre0","title":"Cached Kerberos tickets","pathname":"/redteam/credentials/os-credentials/windows-and-active-directory/cached-kerberos-tickets","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Steal or Forge Kerberos Tickets - Technique T1558","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Credential Access"},{"label":"OS Credentials"},{"label":"Windows & Active Directory"}]},{"id":"5JBdBQlIdUDzxhayi09V","title":"Linux","pathname":"/redteam/credentials/os-credentials/linux","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Credential Access"},{"label":"OS Credentials"}]},{"id":"LjDStJgLtey5vMG4zqkv","title":"Shadow File","pathname":"/redteam/credentials/os-credentials/linux/shadow-file","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ OS Credential Dumping: /etc/passwd and /etc/shadow - Technique T1003.008","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Credential Access"},{"label":"OS Credentials"},{"label":"Linux"}]},{"id":"tlsGi424ZJJyN1WwvLqh","title":"In-memory secrets","pathname":"/redteam/credentials/os-credentials/linux/passwords-in-memory","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ OS Credential Dumping: Proc Filesystem - Technique T1003.007","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Credential Access"},{"label":"OS Credentials"},{"label":"Linux"}]},{"id":"vAPRVJdgfbCX4tefGlpe","title":"Linux Cached Kerberos tickets","pathname":"/redteam/credentials/os-credentials/linux/cached-kerberos-tickets","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Steal or Forge Kerberos Tickets - Technique T1558","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Credential Access"},{"label":"OS Credentials"},{"label":"Linux"}]},{"id":"U5u6R0V6WVRWboYjtC56","title":"Samba LDB files","pathname":"/redteam/credentials/os-credentials/linux/samba-ldb-files","siteSpaceId":"sitesp_6kTLM","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Credential Access"},{"label":"OS Credentials"},{"label":"Linux"}]},{"id":"LIUCvS9LMBDZc0UNDTw6","title":"Samba DCSync (Vampire)","pathname":"/redteam/credentials/os-credentials/linux/samba-dcsync-vampire","siteSpaceId":"sitesp_6kTLM","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Credential Access"},{"label":"OS Credentials"},{"label":"Linux"}]},{"id":"rPpzqWGLrsJmJ51qdQjr","title":"MITM and coerced auths","pathname":"/redteam/credentials/mitm-and-coerced-auths","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Credential Access"}]},{"id":"uovvoXgSRZA2YP51qSkl","title":"Password Attacks","pathname":"/redteam/credentials/passwd","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Credential Access"}]},{"id":"fS4koNiGHJB0L8VDV9sH","title":"Default, weak & Leaked Passwords","pathname":"/redteam/credentials/passwd/default-weak-and-leaked-passwords","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Credential Access"},{"label":"Password Attacks"}]},{"id":"rx9KhNQ3XIqGElqhZuEf","title":"Generate Wordlists","pathname":"/redteam/credentials/passwd/generate-wordlists","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Credential Access"},{"label":"Password Attacks"}]},{"id":"E1d9E1UiJzp4a9uV5Prg","title":"Brute-Force","pathname":"/redteam/credentials/passwd/brute-force","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Brute Force - Technique T1110","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Credential Access"},{"label":"Password Attacks"}]},{"id":"4DaUknqC4mGDGXe0lWBp","title":"Online - Attacking Services","pathname":"/redteam/credentials/passwd/brute-force/online-attacking-services","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Brute Force - Technique T1110","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Credential Access"},{"label":"Password Attacks"},{"label":"Brute-Force"}]},{"id":"2uejUgedS6LaZPX2mxnL","title":"Offline - Password Cracking","pathname":"/redteam/credentials/passwd/brute-force/offline-password-cracking","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Brute Force: Password Cracking - Technique T1110.002","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Credential Access"},{"label":"Password Attacks"},{"label":"Brute-Force"}]},{"id":"wpJODU43Cy65QYOsMTxd","title":"Impersonation","pathname":"/redteam/credentials/impersonation","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Credential Access"}]},{"id":"DYe43Y9rmuGm7xdJXdDU","title":"Lateral Movement","pathname":"/redteam/pivoting","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Lateral Movement - Tactic TA0008","breadcrumbs":[{"label":"Red-Teaming"}]},{"id":"DT8wxsRmDlxsm9G8QOJo","title":"Port Forwarding","pathname":"/redteam/pivoting/portfwd","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Protocol Tunneling  - Technique T1572","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Lateral Movement"}]},{"id":"pkeIm5MPwoz1WqdLnHyJ","title":"TLS Tunneling (Ligolo-ng)","pathname":"/redteam/pivoting/tls-tunneling-ligolo-ng","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Protocol Tunneling  - Technique T1572","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Lateral Movement"}]},{"id":"QAFi1GaLhCOmrFlSIpTa","title":"HTTP(s) Tunneling","pathname":"/redteam/pivoting/http-tunneling","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Protocol Tunneling  - Technique T1572","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Lateral Movement"}]},{"id":"pHfdCVbhkEujklhG0iEP","title":"SSH Tunneling","pathname":"/redteam/pivoting/ssh-tunneling","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Protocol Tunneling  - Technique T1572","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Lateral Movement"}]},{"id":"r421m0aGtn9eVK6SdphE","title":"DNS Tunneling","pathname":"/redteam/pivoting/dnstunneling","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Protocol Tunneling  - Technique T1572","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Lateral Movement"}]},{"id":"cZau5IcqxjqWn5L2jo0H","title":"SMB-based","pathname":"/redteam/pivoting/smb-based","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Remote Services: SMB/Windows Admin Shares - Technique T1021.002","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Lateral Movement"}]},{"id":"mV2ZgUDxNDcdjOmcanlJ","title":"WinRM","pathname":"/redteam/pivoting/winrm","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™  Remote Services: Windows Remote Management   - Technique T1021.006","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Lateral Movement"}]},{"id":"bBoV6hPjmYRVP6w1UZpC","title":"Remote WMI","pathname":"/redteam/pivoting/remote-wmi","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™  Windows Management Instrumentation - Technique T1047","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Lateral Movement"}]},{"id":"qe1TAH0zO1VIG1iEcNWR","title":"DCOM","pathname":"/redteam/pivoting/dcom","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Remote Services: Distributed Component Object Model - Technique T1021.003","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Lateral Movement"}]},{"id":"qqdTNVbpmQsu0MEUFx8Q","title":"Scheduled Tasks (ATSVC)","pathname":"/redteam/pivoting/scheduled-tasks-atsvc","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Lateral Movement"}]},{"id":"DAjgoXGiux0uJKi2UbB8","title":"Services (SVCCTL)","pathname":"/redteam/pivoting/services-svcctl","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Lateral Movement"}]},{"id":"3j5nM5U97p3LvV9wknfk","title":"Exfiltration","pathname":"/redteam/exfiltration","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Exfiltration - Tactic TA0036","breadcrumbs":[{"label":"Red-Teaming"}]},{"id":"ARKcNr3E3ul9XGFot0a8","title":"Exfiltration over ICMP","pathname":"/redteam/exfiltration/icmp","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™  - Exfiltration Over Alternative Protocol - Technique T1048","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Exfiltration"}]},{"id":"zVBeFqwIsAZjnzaaiy0s","title":"Exfiltration Over DNS","pathname":"/redteam/exfiltration/dns","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™  - Exfiltration Over Alternative Protocol - Technique T1048","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Exfiltration"}]},{"id":"CiapULoogIwPbrvg0am4","title":"Exfiltration Over HTTP(s)","pathname":"/redteam/exfiltration/http","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™  - Exfiltration Over Alternative Protocol - Technique T1048","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Exfiltration"}]},{"id":"rQRQjWJOX8ohsrgOPeob","title":"Exfiltration Over SMB","pathname":"/redteam/exfiltration/smb","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ - Exfiltration - Tactic TA0010","breadcrumbs":[{"label":"Red-Teaming"},{"label":"Exfiltration"}]},{"id":"FYzx0rbBVhRNF21C2URk","title":"Reconnaissance","pathname":"/web-pentesting/recon","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"}]},{"id":"9SBVBz7fKr5cKG5EX995","title":"Subdomains enumeration","pathname":"/web-pentesting/recon/subdomain-enum","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Reconnaissance"}]},{"id":"xKBxMTsRqLHyfnK1Znjr","title":"WAF Enumeration","pathname":"/web-pentesting/recon/waf-enum","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Reconnaissance"}]},{"id":"Nd4FVPTZKhYrxEgcopnX","title":"Infrastructures","pathname":"/web-pentesting/infrastructures","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"}]},{"id":"3SF6FDu2YwFSQ79t4T0z","title":"DBMS","pathname":"/web-pentesting/infrastructures/dbms","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Infrastructures"}]},{"id":"mpmW20b0vuUhEyJFOyNe","title":"Enum Databases","pathname":"/web-pentesting/infrastructures/dbms/enum-databases","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Infrastructures"},{"label":"DBMS"}]},{"id":"BjBIBsYcPd6swhCPQyVu","title":"Read/Write/Execute","pathname":"/web-pentesting/infrastructures/dbms/exploit-databases","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Infrastructures"},{"label":"DBMS"}]},{"id":"SEYWwdHEeG6nW8Gf8eR6","title":"DNS","pathname":"/web-pentesting/infrastructures/dns","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Infrastructures"}]},{"id":"m1ivTaxdo6LphzzZ0hiN","title":"Subdomain Takeover","pathname":"/web-pentesting/infrastructures/dns/subdomain-takeover","siteSpaceId":"sitesp_6kTLM","description":"OWASP: WSTG-CONF-10","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Infrastructures"},{"label":"DNS"}]},{"id":"95DnnqR0dvBIYf7sZEAe","title":"Web Servers","pathname":"/web-pentesting/infrastructures/web-servers","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Infrastructures"}]},{"id":"uRYRJmI55v3O45Rjccta","title":"Nginx","pathname":"/web-pentesting/infrastructures/web-servers/nginx","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Infrastructures"},{"label":"Web Servers"}]},{"id":"CPCLLIUffBseMSHLI4dl","title":"Apache","pathname":"/web-pentesting/infrastructures/web-servers/apache","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Infrastructures"},{"label":"Web Servers"}]},{"id":"7BZkuxvu8yjanCuihvBs","title":"Apache Commons Text","pathname":"/web-pentesting/infrastructures/web-servers/apache/apache-commons-text","siteSpaceId":"sitesp_6kTLM","description":"CVE-2022-42889 - Text4Shell","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Infrastructures"},{"label":"Web Servers"},{"label":"Apache"}]},{"id":"YzAVCfV8A5W57AMtGElY","title":"Apache Tomcat","pathname":"/web-pentesting/infrastructures/web-servers/apache/tomcat","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Infrastructures"},{"label":"Web Servers"},{"label":"Apache"}]},{"id":"eUhYae1ZVC4TcFdRcTl5","title":"CMS","pathname":"/web-pentesting/infrastructures/cms","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Infrastructures"}]},{"id":"C1lCVSwK9tWI3cyHltgP","title":"Wordpress","pathname":"/web-pentesting/infrastructures/cms/wordpress","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Infrastructures"},{"label":"CMS"}]},{"id":"96kpdIdt4k4uvUSmLLsh","title":"Joomla","pathname":"/web-pentesting/infrastructures/cms/joomla","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Infrastructures"},{"label":"CMS"}]},{"id":"7kOjM4Fo7Bd6Ff3mHdr4","title":"Drupal","pathname":"/web-pentesting/infrastructures/cms/drupal","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Infrastructures"},{"label":"CMS"}]},{"id":"qQR7mXGaM1STqA5ETghD","title":"Bolt CMS","pathname":"/web-pentesting/infrastructures/cms/bolt-cms","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Infrastructures"},{"label":"CMS"}]},{"id":"8Fg6HxFWimtbi6OIT7YT","title":"Frameworks","pathname":"/web-pentesting/infrastructures/frameworks","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Infrastructures"}]},{"id":"r1r00KCYelcEpTMWv60b","title":"Spring Framework","pathname":"/web-pentesting/infrastructures/frameworks/spring","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Infrastructures"},{"label":"Frameworks"}]},{"id":"G8aQgZQloCh71dlpAR0G","title":"Spring Routing Abuse","pathname":"/web-pentesting/infrastructures/frameworks/spring/spring-routing-abuse","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Infrastructures"},{"label":"Frameworks"},{"label":"Spring Framework"}]},{"id":"nFPpUsXHSj3Cs5Em7G1d","title":"Spring Boot Actuators","pathname":"/web-pentesting/infrastructures/frameworks/spring/spring-boot-actuators","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Infrastructures"},{"label":"Frameworks"},{"label":"Spring Framework"}]},{"id":"Q8eZsxDxJ1jw0Iciflu6","title":"Spring View Manipulation","pathname":"/web-pentesting/infrastructures/frameworks/spring/spring-view-manipulation","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Infrastructures"},{"label":"Frameworks"},{"label":"Spring Framework"}]},{"id":"hf7hB6xE5Y8p6AUONejt","title":"Werkzeug","pathname":"/web-pentesting/infrastructures/frameworks/werkzeug","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Infrastructures"},{"label":"Frameworks"}]},{"id":"m1sjCRy85DkeVb2VdJde","title":"Django","pathname":"/web-pentesting/infrastructures/frameworks/django","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Infrastructures"},{"label":"Frameworks"}]},{"id":"PVTeIiOjctc3bjciBCfw","title":"Flask","pathname":"/web-pentesting/infrastructures/frameworks/flask","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Infrastructures"},{"label":"Frameworks"}]},{"id":"9ylZ3mhbZ16jO7R1J3Pd","title":"Laravel","pathname":"/web-pentesting/infrastructures/frameworks/laravel","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Infrastructures"},{"label":"Frameworks"}]},{"id":"g6qgu5ClGwo7GTkEoX97","title":"CGI","pathname":"/web-pentesting/infrastructures/cgi","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Infrastructures"}]},{"id":"cjqfxxwyX2Y1b86XOps9","title":"Web Vulnerabilities","pathname":"/web-pentesting/web-vulnerabilities","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"}]},{"id":"rdN5UQSBiSbPntpQwYx4","title":"Server-Side","pathname":"/web-pentesting/web-vulnerabilities/server-side","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Web Vulnerabilities"}]},{"id":"8Jn0rrbpa3T62u9txeWX","title":"NoSQL Injection","pathname":"/web-pentesting/web-vulnerabilities/server-side/nosql-injection","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Web Vulnerabilities"},{"label":"Server-Side"}]},{"id":"PW6EKKjblOftO82m6Ult","title":"SQL Injection","pathname":"/web-pentesting/web-vulnerabilities/server-side/sql-injection","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Web Vulnerabilities"},{"label":"Server-Side"}]},{"id":"KFFDlIiQv2uyWh92TNXY","title":"UNION Attacks","pathname":"/web-pentesting/web-vulnerabilities/server-side/sql-injection/union-attacks","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Web Vulnerabilities"},{"label":"Server-Side"},{"label":"SQL Injection"}]},{"id":"jzGWB3AZj09C1rMJBH3X","title":"Blind Attacks","pathname":"/web-pentesting/web-vulnerabilities/server-side/sql-injection/blind-sqli","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Web Vulnerabilities"},{"label":"Server-Side"},{"label":"SQL Injection"}]},{"id":"r635T88J4jzxxo09kchR","title":"Boolean Based","pathname":"/web-pentesting/web-vulnerabilities/server-side/sql-injection/blind-sqli/boolean-based","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Web Vulnerabilities"},{"label":"Server-Side"},{"label":"SQL Injection"},{"label":"Blind Attacks"}]},{"id":"CIZxYrvhKLQMTYndIJAo","title":"Time Based","pathname":"/web-pentesting/web-vulnerabilities/server-side/sql-injection/blind-sqli/time-based","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Web Vulnerabilities"},{"label":"Server-Side"},{"label":"SQL Injection"},{"label":"Blind Attacks"}]},{"id":"BbkrO6jkKeKcfln8TqXw","title":"Error Based","pathname":"/web-pentesting/web-vulnerabilities/server-side/sql-injection/blind-sqli/error-based","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Web Vulnerabilities"},{"label":"Server-Side"},{"label":"SQL Injection"},{"label":"Blind Attacks"}]},{"id":"SO5YGiUln7wTDJOKFPqP","title":"Insecure Deserialization","pathname":"/web-pentesting/web-vulnerabilities/server-side/deserialization","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Web Vulnerabilities"},{"label":"Server-Side"}]},{"id":"M8tKn2WrtOPFEEfYo6nC","title":".NET Deserialization","pathname":"/web-pentesting/web-vulnerabilities/server-side/deserialization/dotnet","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Web Vulnerabilities"},{"label":"Server-Side"},{"label":"Insecure Deserialization"}]},{"id":"iiB9tJkGzJdkgLZALtFv","title":"Python Deserialization","pathname":"/web-pentesting/web-vulnerabilities/server-side/deserialization/python","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Web Vulnerabilities"},{"label":"Server-Side"},{"label":"Insecure Deserialization"}]},{"id":"x7qa2rTEv4eAY8GvQ83x","title":"PHP Deserialization","pathname":"/web-pentesting/web-vulnerabilities/server-side/deserialization/php","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Web Vulnerabilities"},{"label":"Server-Side"},{"label":"Insecure Deserialization"}]},{"id":"ulwqQHcfs8IdfKxZoQBa","title":"Java Deserialization","pathname":"/web-pentesting/web-vulnerabilities/server-side/deserialization/java","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Web Vulnerabilities"},{"label":"Server-Side"},{"label":"Insecure Deserialization"}]},{"id":"DfxKAFf9OXCAQQd7EswK","title":"Ruby Deserialization","pathname":"/web-pentesting/web-vulnerabilities/server-side/deserialization/ruby","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Web Vulnerabilities"},{"label":"Server-Side"},{"label":"Insecure Deserialization"}]},{"id":"5iNeahGSQyzNsSXeYDvI","title":"File Inclusion & Path Traversal","pathname":"/web-pentesting/web-vulnerabilities/server-side/file-inclusion","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Web Vulnerabilities"},{"label":"Server-Side"}]},{"id":"av5ValRpjOpdHoSsz9IF","title":"LFI to RCE","pathname":"/web-pentesting/web-vulnerabilities/server-side/file-inclusion/lfi2rce","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Web Vulnerabilities"},{"label":"Server-Side"},{"label":"File Inclusion & Path Traversal"}]},{"id":"7IqmLH7mC2c29NJ5T5zg","title":"PHP Wrappers","pathname":"/web-pentesting/web-vulnerabilities/server-side/file-inclusion/lfi2rce/php-wrappers","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Web Vulnerabilities"},{"label":"Server-Side"},{"label":"File Inclusion & Path Traversal"},{"label":"LFI to RCE"}]},{"id":"Ho0FsncpQkndbcFPVnIs","title":"Logs Poisoning","pathname":"/web-pentesting/web-vulnerabilities/server-side/file-inclusion/lfi2rce/logs-poisoning","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Web Vulnerabilities"},{"label":"Server-Side"},{"label":"File Inclusion & Path Traversal"},{"label":"LFI to RCE"}]},{"id":"za8ZNbhWj5N5fWdRWzKm","title":"/proc","pathname":"/web-pentesting/web-vulnerabilities/server-side/file-inclusion/lfi2rce/proc","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Web Vulnerabilities"},{"label":"Server-Side"},{"label":"File Inclusion & Path Traversal"},{"label":"LFI to RCE"}]},{"id":"tRtzjLByVDN88LrYKYcJ","title":"PHPInfo","pathname":"/web-pentesting/web-vulnerabilities/server-side/file-inclusion/lfi2rce/phpinfo","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Web Vulnerabilities"},{"label":"Server-Side"},{"label":"File Inclusion & Path Traversal"},{"label":"LFI to RCE"}]},{"id":"EjnOZg34erSgOzRmdgrc","title":"PHP Sessions","pathname":"/web-pentesting/web-vulnerabilities/server-side/file-inclusion/lfi2rce/php-sessions","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Web Vulnerabilities"},{"label":"Server-Side"},{"label":"File Inclusion & Path Traversal"},{"label":"LFI to RCE"}]},{"id":"Y1U8MpCKRMvKytQPYZGx","title":"Segmentation Fault","pathname":"/web-pentesting/web-vulnerabilities/server-side/file-inclusion/lfi2rce/segmentation-fault","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Web Vulnerabilities"},{"label":"Server-Side"},{"label":"File Inclusion & Path Traversal"},{"label":"LFI to RCE"}]},{"id":"C54zonUu2nUc2E8eI4BJ","title":"RFI to RCE","pathname":"/web-pentesting/web-vulnerabilities/server-side/file-inclusion/rfi-to-rce","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Web Vulnerabilities"},{"label":"Server-Side"},{"label":"File Inclusion & Path Traversal"}]},{"id":"6GD1HmrmRipkzaCfvQrD","title":"Command Injection","pathname":"/web-pentesting/web-vulnerabilities/server-side/command-injection","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Web Vulnerabilities"},{"label":"Server-Side"}]},{"id":"XsCHrzXVo4ukyeFmanOO","title":"Brute-Force","pathname":"/web-pentesting/web-vulnerabilities/server-side/brute-force","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Web Vulnerabilities"},{"label":"Server-Side"}]},{"id":"qjRJALufBF6mtZZQsuf9","title":"SSTI (Server-Side Template Injection)","pathname":"/web-pentesting/web-vulnerabilities/server-side/ssti","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Web Vulnerabilities"},{"label":"Server-Side"}]},{"id":"BF2DqhTuW0NppR0uyLyX","title":"Exposed Git Repositories","pathname":"/web-pentesting/web-vulnerabilities/server-side/exposed-git-repositories","siteSpaceId":"sitesp_6kTLM","description":"OWASP A3:2017-Sensitive Data Exposure","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Web Vulnerabilities"},{"label":"Server-Side"}]},{"id":"tAbZzQWAFQbBDrxYpEeN","title":"File Upload","pathname":"/web-pentesting/web-vulnerabilities/server-side/file-upload","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Web Vulnerabilities"},{"label":"Server-Side"}]},{"id":"fPDVtENpbPN4VBCgOEbL","title":"Client-Side","pathname":"/web-pentesting/web-vulnerabilities/client-side","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Web Vulnerabilities"}]},{"id":"n2hyiUhYQoEfwHeg93ox","title":"XSS (Cross-Site Scripting)","pathname":"/web-pentesting/web-vulnerabilities/client-side/xss-cross-site-scripting","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Web Vulnerabilities"},{"label":"Client-Side"}]},{"id":"1Ghasw7UCDAOzM3W25lp","title":"CORS (Cross-origin resource sharing)","pathname":"/web-pentesting/web-vulnerabilities/client-side/cors-cross-origin-resource-sharing","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Web Pentesting"},{"label":"Web Vulnerabilities"},{"label":"Client-Side"}]},{"id":"oB0FThwUABBwRvpaxodD","title":"Network services","pathname":"/network-pentesting/protocols","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Network Pentesting"}]},{"id":"IPN1wopfm0OQpXCv82gx","title":"DNS","pathname":"/network-pentesting/protocols/dns","siteSpaceId":"sitesp_6kTLM","description":"Pentesting DNS - TCP/UDP Port 53","breadcrumbs":[{"label":"Network Pentesting"},{"label":"Network services"}]},{"id":"xpu8Slho4TNJVcToIaEG","title":"FastCGI","pathname":"/network-pentesting/protocols/fastcgi","siteSpaceId":"sitesp_6kTLM","description":"Pentesting FastCGI - TCP Port 9000","breadcrumbs":[{"label":"Network Pentesting"},{"label":"Network services"}]},{"id":"SJ1wz8kFtQK72ZbixY3y","title":"HTTP & HTTPS","pathname":"/network-pentesting/protocols/http-and-https","siteSpaceId":"sitesp_6kTLM","description":"Pentesting  HTTP & HTTP - TCP Ports 80,443","breadcrumbs":[{"label":"Network Pentesting"},{"label":"Network services"}]},{"id":"uwePpCzpbi5jAtm3eRK0","title":"LDAP","pathname":"/network-pentesting/protocols/ldap","siteSpaceId":"sitesp_6kTLM","description":"Pentesting LDAP - TCP Ports 389,3268,636,3269","breadcrumbs":[{"label":"Network Pentesting"},{"label":"Network services"}]},{"id":"FAvl7ZfoDIgmYQMydyvg","title":"NFS","pathname":"/network-pentesting/protocols/nfs","siteSpaceId":"sitesp_6kTLM","description":"Pentesting NFS - TCP/UDP Port 2049","breadcrumbs":[{"label":"Network Pentesting"},{"label":"Network services"}]},{"id":"UqYm02yix6wYpzmnRvna","title":"MS-RPC","pathname":"/network-pentesting/protocols/ms-rpc","siteSpaceId":"sitesp_6kTLM","description":"Pentesting MS-RPC - TCP Ports 135,593","breadcrumbs":[{"label":"Network Pentesting"},{"label":"Network services"}]},{"id":"M8GhwQh5RAcCYK3vhrw8","title":"MSSQL","pathname":"/network-pentesting/protocols/mssql","siteSpaceId":"sitesp_6kTLM","description":"Pentesting MSSQL - TCP Port 1433","breadcrumbs":[{"label":"Network Pentesting"},{"label":"Network services"}]},{"id":"FirDsoELhNCho7NQqVyg","title":"NBT-NS (NetBIOS)","pathname":"/network-pentesting/protocols/nbt-ns-netbios","siteSpaceId":"sitesp_6kTLM","description":"Pentesting NBT-NS - TCP/UDP Ports 137,138,139","breadcrumbs":[{"label":"Network Pentesting"},{"label":"Network services"}]},{"id":"wJZveVcSe8DEQeircY0e","title":"Oracle TNS","pathname":"/network-pentesting/protocols/oracle-tns","siteSpaceId":"sitesp_6kTLM","description":"Pentesting Oracle TNS - TCP Ports 1521,1522-1529","breadcrumbs":[{"label":"Network Pentesting"},{"label":"Network services"}]},{"id":"xd00u22y1YggyDdokwEW","title":"RDP","pathname":"/network-pentesting/protocols/rdp","siteSpaceId":"sitesp_6kTLM","description":"Pentesting RDP - TCP Port 3389","breadcrumbs":[{"label":"Network Pentesting"},{"label":"Network services"}]},{"id":"zWnGBOpHdi6XIhaGw9OS","title":"Rsync","pathname":"/network-pentesting/protocols/rsync","siteSpaceId":"sitesp_6kTLM","description":"Pentesting RSync - TCP Ports 873","breadcrumbs":[{"label":"Network Pentesting"},{"label":"Network services"}]},{"id":"3X5JzpYiOBnIodASY814","title":"SMB","pathname":"/network-pentesting/protocols/smb","siteSpaceId":"sitesp_6kTLM","description":"Pentesting SMB - TCP Ports 445,139","breadcrumbs":[{"label":"Network Pentesting"},{"label":"Network services"}]},{"id":"wS3JuDMHenrCg2e0pLF4","title":"SMTP","pathname":"/network-pentesting/protocols/smtp","siteSpaceId":"sitesp_6kTLM","description":"Pentesting SMTP - TCP Ports 25,465,587","breadcrumbs":[{"label":"Network Pentesting"},{"label":"Network services"}]},{"id":"cRkzEeODz8E21kwOSnua","title":"SNMP","pathname":"/network-pentesting/protocols/snmp","siteSpaceId":"sitesp_6kTLM","description":"Pentesting SNMP - UDP Ports 161,162,10161,10162","breadcrumbs":[{"label":"Network Pentesting"},{"label":"Network services"}]},{"id":"NuU7LJohtpAMRLHSWoKM","title":"SSH","pathname":"/network-pentesting/protocols/ssh","siteSpaceId":"sitesp_6kTLM","description":"Pentesting SSH - TCP Port 22","breadcrumbs":[{"label":"Network Pentesting"},{"label":"Network services"}]},{"id":"mf70ziQ0p8al0mIT5yvg","title":"WebDAV","pathname":"/network-pentesting/protocols/webdav","siteSpaceId":"sitesp_6kTLM","description":"Pentesting WebDAV - TCP Ports 80,443","breadcrumbs":[{"label":"Network Pentesting"},{"label":"Network services"}]},{"id":"3Pi1bh3U1b5buguAIZMJ","title":"WinRM","pathname":"/network-pentesting/protocols/winrm","siteSpaceId":"sitesp_6kTLM","description":"Pentesting WinRM - TCP Ports 5985,5986","breadcrumbs":[{"label":"Network Pentesting"},{"label":"Network services"}]},{"id":"CUOuJQGBfPdJuG0bV7FH","title":"XMPP/Jabber","pathname":"/network-pentesting/protocols/xmpp-jabber","siteSpaceId":"sitesp_6kTLM","description":"Pentesting XMPP/Jabber - TCP Ports 5222, 5269, 8010","breadcrumbs":[{"label":"Network Pentesting"},{"label":"Network services"}]},{"id":"lrkvmgHccFVBYEifZVG8","title":"RPC Port Mapper","pathname":"/network-pentesting/protocols/rpc-port-mapper","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"Port TCP/UDP 111","breadcrumbs":[{"label":"Network Pentesting"},{"label":"Network services"}]},{"id":"Da7sfl5OWstj1T1yxhzu","title":"FTP","pathname":"/network-pentesting/protocols/ftp","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Network Pentesting"},{"label":"Network services"}]},{"id":"VscW7hhQZ4f55J94OvE9","title":"Telnet","pathname":"/network-pentesting/protocols/telnet","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Network Pentesting"},{"label":"Network services"}]},{"id":"BGsTVMeAryuLC1eZ865P","title":"MySQL","pathname":"/network-pentesting/protocols/mysql","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Network Pentesting"},{"label":"Network services"}]},{"id":"ihenCfac8dNApEOQxOVh","title":"WiFi","pathname":"/network-pentesting/wifi","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Network Pentesting"}]},{"id":"YGfQTclxHdGklIEWC9WR","title":"WEP","pathname":"/network-pentesting/wifi/wep","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Network Pentesting"},{"label":"WiFi"}]},{"id":"JqdzUr1MHaFokcFvl9T9","title":"WPA2","pathname":"/network-pentesting/wifi/wpa2","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Network Pentesting"},{"label":"WiFi"}]},{"id":"sxAbEV1MU72BkRJRhz5J","title":"WPS","pathname":"/network-pentesting/wifi/wps","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Network Pentesting"},{"label":"WiFi"}]},{"id":"hm0vYvtB39m5hRTPlj49","title":"Bluetooth","pathname":"/network-pentesting/bluetooth","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Network Pentesting"}]},{"id":"7ALJyJ9LVA4hEiLmQ0Lb","title":"Reconnaissance","pathname":"/ad/recon","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"}]},{"id":"HKrb8Lo7DydXnZSgN1WJ","title":"Tools ⚙️","pathname":"/ad/recon/tools","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Reconnaissance"}]},{"id":"nFka9uQQxgOhks3xRpv8","title":"PowerView ⚙️","pathname":"/ad/recon/tools/powerview","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Reconnaissance"},{"label":"Tools ⚙️"}]},{"id":"7Lfl4GoioYs045q1cCzN","title":"Responder ⚙️","pathname":"/ad/recon/tools/responder","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Reconnaissance"},{"label":"Tools ⚙️"}]},{"id":"xpmimD0H1rp8moiI679W","title":"BloodHound ⚙️","pathname":"/ad/recon/tools/bloodhound","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Reconnaissance"},{"label":"Tools ⚙️"}]},{"id":"WH7Gxj5crOwQkL3t52B1","title":"enum4linux ⚙️","pathname":"/ad/recon/tools/enum4linux","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Reconnaissance"},{"label":"Tools ⚙️"}]},{"id":"uS2FXq3V06HxcMFVEYlN","title":"Network","pathname":"/ad/recon/network","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Reconnaissance"}]},{"id":"xjEvB2LIav6c51S2apWq","title":"DHCP","pathname":"/ad/recon/network/dhcp","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Reconnaissance"},{"label":"Network"}]},{"id":"0D8kEdRfYyK375iI6rOf","title":"DNS","pathname":"/ad/recon/network/dns","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Reconnaissance"},{"label":"Network"}]},{"id":"3cQOpbigLdTPuMcEUeF4","title":"NBT-NS","pathname":"/ad/recon/network/nbt-ns","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Reconnaissance"},{"label":"Network"}]},{"id":"eMDHsLafkWMw02x3SapS","title":"Port scanning","pathname":"/ad/recon/network/port-scanning","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Reconnaissance"},{"label":"Network"}]},{"id":"nC9nojVOsbZMSDcZW1DK","title":"SMB","pathname":"/ad/recon/network/smb","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Reconnaissance"},{"label":"Network"}]},{"id":"UAhK55NCu8YDs0yPQztv","title":"LDAP","pathname":"/ad/recon/network/ldap","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Reconnaissance"},{"label":"Network"}]},{"id":"HJLzmu5xEac1XArAX8vm","title":"MS-RPC","pathname":"/ad/recon/network/ms-rpc","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Reconnaissance"},{"label":"Network"}]},{"id":"ujYvygeeUkkM3pRYDRhp","title":"Objects & Settings","pathname":"/ad/recon/objects-and-settings","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Reconnaissance"}]},{"id":"C5snN8lUc2uZfHmhdE6N","title":"DACLs","pathname":"/ad/recon/objects-and-settings/dacls","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Reconnaissance"},{"label":"Objects & Settings"}]},{"id":"GcNiL7eQlZ5ZHxYTdzly","title":"Group policies","pathname":"/ad/recon/objects-and-settings/group-policies","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Reconnaissance"},{"label":"Objects & Settings"}]},{"id":"llMcJygXD5uuVYC6GUcj","title":"Password policy","pathname":"/ad/recon/objects-and-settings/password-policy","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Reconnaissance"},{"label":"Objects & Settings"}]},{"id":"szzjqMEVALTOzV5PRu2d","title":"LAPS","pathname":"/ad/recon/objects-and-settings/laps","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Reconnaissance"},{"label":"Objects & Settings"}]},{"id":"JCLjmz6dL3oag85h4dWV","title":"Movement","pathname":"/ad/movement","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"}]},{"id":"RTZNO8Vf4AKZQgjt1SEW","title":"Credentials","pathname":"/ad/movement/credentials","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"}]},{"id":"R5IhttI2Ozcp9POjI0uB","title":"Dumping","pathname":"/ad/movement/credentials/dumping","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Techniques T1003 and T1552","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Credentials"}]},{"id":"FxpXylhHVnOUI0rT0P1h","title":"Cracking","pathname":"/ad/movement/credentials/cracking","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Sub-technique T1110.002","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Credentials"}]},{"id":"zCGcwDzeV9BoJtCqqzct","title":"Bruteforcing","pathname":"/ad/movement/credentials/bruteforcing","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Credentials"}]},{"id":"ceuRO4fuoFF97pSKNiQ8","title":"Guessing","pathname":"/ad/movement/credentials/bruteforcing/guessing","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Sub-technique T1110.001","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Credentials"},{"label":"Bruteforcing"}]},{"id":"hZr0gwwfk3TiPZ9oDwIU","title":"Spraying","pathname":"/ad/movement/credentials/bruteforcing/password-spraying","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Sub-technique T1110.003","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Credentials"},{"label":"Bruteforcing"}]},{"id":"gzRK6PpAzlILcB6QATpn","title":"Stuffing","pathname":"/ad/movement/credentials/bruteforcing/stuffing","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Sub-technique T1110.004","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Credentials"},{"label":"Bruteforcing"}]},{"id":"H1lmfZsuaxI6g7pBbXTE","title":"Shuffling","pathname":"/ad/movement/credentials/credential-shuffling","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Techniques T1003 and T1552 (kind of)","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Credentials"}]},{"id":"AzbCAEmnSe6nz65MwUzf","title":"MITM and coerced auths","pathname":"/ad/movement/mitm-and-coerced-authentications","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"}]},{"id":"gnVnBrrogFN4KRxuaewQ","title":"ARP poisoning","pathname":"/ad/movement/mitm-and-coerced-authentications/arp-poisoning","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Sub-technique T1557.002","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"MITM and coerced auths"}]},{"id":"uWj4tI7OjP6ObTgvIZMW","title":"DNS spoofing","pathname":"/ad/movement/mitm-and-coerced-authentications/dns-spoofing","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"MITM and coerced auths"}]},{"id":"4WeFdWcMzq0EojHw9cM6","title":"DHCP poisoning","pathname":"/ad/movement/mitm-and-coerced-authentications/dhcp-poisoning","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"MITM and coerced auths"}]},{"id":"DiwqeUFwe31FeOseSrLB","title":"DHCPv6 spoofing","pathname":"/ad/movement/mitm-and-coerced-authentications/dhcpv6-spoofing","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"MITM and coerced auths"}]},{"id":"bP1zxcDDP7OjG586AJ8H","title":"WSUS spoofing","pathname":"/ad/movement/mitm-and-coerced-authentications/wsus-spoofing","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"MITM and coerced auths"}]},{"id":"KTvh6NycLB61NCAtuhRY","title":"LLMNR, NBT-NS, mDNS spoofing","pathname":"/ad/movement/mitm-and-coerced-authentications/llmnr-nbtns-mdns-spoofing","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Sub-technique T1557.001","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"MITM and coerced auths"}]},{"id":"7Y6dQjXZSyO2XliglD2X","title":"ADIDNS poisoning","pathname":"/ad/movement/mitm-and-coerced-authentications/adidns-spoofing","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"MITM and coerced auths"}]},{"id":"JP6FIapmBZ7KWUGrN0jf","title":"WPAD spoofing","pathname":"/ad/movement/mitm-and-coerced-authentications/wpad-spoofing","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"MITM and coerced auths"}]},{"id":"mso3f3fLtHNy3vrydugr","title":"MS-EFSR abuse (PetitPotam)","pathname":"/ad/movement/mitm-and-coerced-authentications/ms-efsr","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"MITM and coerced auths"}]},{"id":"imEBkqZQ1YpoJvqK1xhy","title":"MS-RPRN abuse (PrinterBug)","pathname":"/ad/movement/mitm-and-coerced-authentications/ms-rprn","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"MITM and coerced auths"}]},{"id":"OaNiBo7lH37KDSZV28g7","title":"MS-FSRVP abuse (ShadowCoerce)","pathname":"/ad/movement/mitm-and-coerced-authentications/ms-fsrvp","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"MITM and coerced auths"}]},{"id":"WXQp3ocg3l1SgLJhgFfs","title":"MS-DFSNM abuse (DFSCoerce)","pathname":"/ad/movement/mitm-and-coerced-authentications/ms-dfsnm","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"MITM and coerced auths"}]},{"id":"wtvoX440E6htSC9o0uwm","title":"MS-EVEN abuse (CheeseOunce)","pathname":"/ad/movement/mitm-and-coerced-authentications/ms-even-abuse-cheeseounce","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"MITM and coerced auths"}]},{"id":"xZCZJRVW0GDMUbFwBex7","title":"PushSubscription abuse","pathname":"/ad/movement/mitm-and-coerced-authentications/pushsubscription-abuse","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"MITM and coerced auths"}]},{"id":"hNN3ncg4wTtkbkfjlkKa","title":"WebClient abuse (WebDAV)","pathname":"/ad/movement/mitm-and-coerced-authentications/webclient","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"MITM and coerced auths"}]},{"id":"5S65A5DtqIwDo77FGIMb","title":"Living off the land","pathname":"/ad/movement/mitm-and-coerced-authentications/living-off-the-land","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"MITM and coerced auths"}]},{"id":"nLbVOoNtPYfMR4B6kK4q","title":"NBT Name Overwrite","pathname":"/ad/movement/mitm-and-coerced-authentications/nbt-name-overwrite","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"MITM and coerced auths"}]},{"id":"j7mdkEeXj0zc5UPl1ZFG","title":"ICMP Redirect","pathname":"/ad/movement/mitm-and-coerced-authentications/icmp-redirect","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"MITM and coerced auths"}]},{"id":"sq3l5ZKXnU7Ehx914SbF","title":"NTLM","pathname":"/ad/movement/ntlm","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"}]},{"id":"l568eM9LCsku8xhXAlFa","title":"Capture","pathname":"/ad/movement/ntlm/capture","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"NTLM"}]},{"id":"dITEDoAK1RAaM5WduGWV","title":"Relay","pathname":"/ad/movement/ntlm/relay","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Sub-technique T1557.001","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"NTLM"}]},{"id":"aw5AWUJX8l3yzwPZUU3s","title":"Pass the hash","pathname":"/ad/movement/ntlm/pth","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Sub-technique T1550.002","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"NTLM"}]},{"id":"yqCyaiSNYytVlkkqkfsy","title":"Kerberos","pathname":"/ad/movement/kerberos","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"}]},{"id":"idlcNcOeGkq8yo3rglps","title":"Pre-auth bruteforce","pathname":"/ad/movement/kerberos/pre-auth-bruteforce","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Kerberos"}]},{"id":"6IV8jltazXYvBG3FI1qh","title":"Pass the key","pathname":"/ad/movement/kerberos/ptk","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Kerberos"}]},{"id":"b1dmFiMEfvTyCsXu8znw","title":"Overpass the hash","pathname":"/ad/movement/kerberos/opth","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Kerberos"}]},{"id":"neVeeXUxo7BKYn2hsv7c","title":"Pass the ticket","pathname":"/ad/movement/kerberos/ptt","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Sub-technique T1550.003","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Kerberos"}]},{"id":"UULMjfGMXcHB1071v8dM","title":"Pass the cache","pathname":"/ad/movement/kerberos/ptc","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Kerberos"}]},{"id":"lnvUbyfbGqv49cUZ2CRU","title":"Forged tickets","pathname":"/ad/movement/kerberos/forged-tickets","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Sub-techniques T1558.001 and T1558.002","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Kerberos"}]},{"id":"Oz7MYaqsOmHA61kC8nR5","title":"Silver tickets","pathname":"/ad/movement/kerberos/forged-tickets/silver","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Kerberos"},{"label":"Forged tickets"}]},{"id":"1ZgHsR2vDDBBeqFPmt5L","title":"Golden tickets","pathname":"/ad/movement/kerberos/forged-tickets/golden","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Kerberos"},{"label":"Forged tickets"}]},{"id":"B9ijiPbETu3z9CtQvej5","title":"Diamond tickets","pathname":"/ad/movement/kerberos/forged-tickets/diamond","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Kerberos"},{"label":"Forged tickets"}]},{"id":"MWI6dpD1IbMSVAb5UZeB","title":"Sapphire tickets","pathname":"/ad/movement/kerberos/forged-tickets/sapphire","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Kerberos"},{"label":"Forged tickets"}]},{"id":"nZLRTkfq2ilUwGZacWFo","title":"RODC Golden tickets","pathname":"/ad/movement/kerberos/forged-tickets/rodc-golden-tickets","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Kerberos"},{"label":"Forged tickets"}]},{"id":"56dzJJ9cQ1x9k912X48T","title":"MS14-068","pathname":"/ad/movement/kerberos/forged-tickets/ms14-068","siteSpaceId":"sitesp_6kTLM","description":"CVE-2014-6324","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Kerberos"},{"label":"Forged tickets"}]},{"id":"XyD7hGF5LsHe6lvBPiJU","title":"ASREQroast","pathname":"/ad/movement/kerberos/asreqroast","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Kerberos"}]},{"id":"osrzjaOJkTvKc7mYZaVT","title":"ASREProast","pathname":"/ad/movement/kerberos/asreproast","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Kerberos"}]},{"id":"YA8afk2SN07442FbkjZ6","title":"Kerberoast","pathname":"/ad/movement/kerberos/kerberoast","siteSpaceId":"sitesp_6kTLM","description":"MITRE ATT&CK™ Sub-technique T1558.003","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Kerberos"}]},{"id":"U0JDKmgG2HEdfefo671D","title":"Delegations","pathname":"/ad/movement/kerberos/delegations","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Kerberos"}]},{"id":"y9O6kHyAV23msDFz8jSC","title":"(KUD) Unconstrained","pathname":"/ad/movement/kerberos/delegations/unconstrained","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Kerberos"},{"label":"Delegations"}]},{"id":"UT6FOj7eudZGSw1RVwQm","title":"(KCD) Constrained","pathname":"/ad/movement/kerberos/delegations/constrained","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Kerberos"},{"label":"Delegations"}]},{"id":"htnTxu7Lh2FZC87SiVFc","title":"(RBCD) Resource-based constrained","pathname":"/ad/movement/kerberos/delegations/rbcd","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Kerberos"},{"label":"Delegations"}]},{"id":"DTrcZ48nEYymDowDr54x","title":"S4U2self abuse","pathname":"/ad/movement/kerberos/delegations/s4u2self-abuse","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Kerberos"},{"label":"Delegations"}]},{"id":"7HjQaxw8d8kblsVrLqe4","title":"Bronze Bit","pathname":"/ad/movement/kerberos/delegations/bronze-bit","siteSpaceId":"sitesp_6kTLM","description":"CVE-2020-17049","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Kerberos"},{"label":"Delegations"}]},{"id":"gwD7mZm1tCnRoRubJROr","title":"Shadow Credentials","pathname":"/ad/movement/kerberos/shadow-credentials","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Kerberos"}]},{"id":"VpDO9f6ukCDwx8MpGGww","title":"UnPAC the hash","pathname":"/ad/movement/kerberos/unpac-the-hash","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Kerberos"}]},{"id":"3ByNdcs95DPHFNeDqrYU","title":"Pass the Certificate - PKINIT","pathname":"/ad/movement/kerberos/pass-the-certificate","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Kerberos"}]},{"id":"4WiFGtRTExnqQQGepZh1","title":"Kerberos relay","pathname":"/ad/movement/kerberos/kerberos-relay","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Kerberos"}]},{"id":"AdZtARlUCPtWmYQZHCrS","title":"sAMAccountName spoofing","pathname":"/ad/movement/kerberos/samaccountname-spoofing","siteSpaceId":"sitesp_6kTLM","description":"CVE-2021-42278 and CVE-2021-42287","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Kerberos"}]},{"id":"JOAfFEO8LVPLBmYIkW4q","title":"SPN-jacking","pathname":"/ad/movement/kerberos/spn-jacking","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Kerberos"}]},{"id":"nRC6JnM2zqu8LxAzs9la","title":"Netlogon","pathname":"/ad/movement/netlogon","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"}]},{"id":"dmNb3YTsFr2G0w2FcT42","title":"ZeroLogon","pathname":"/ad/movement/netlogon/zerologon","siteSpaceId":"sitesp_6kTLM","description":"CVE-2020-1472","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Netlogon"}]},{"id":"BVI9CivSegOkhFIfJyhr","title":"DACL abuse","pathname":"/ad/movement/dacl","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"}]},{"id":"rGsiJ3BU6SlUyZs0BA74","title":"AddMember","pathname":"/ad/movement/dacl/addmember","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"DACL abuse"}]},{"id":"PSsGdO7P6RkMLLGEKa4W","title":"ForceChangePassword","pathname":"/ad/movement/dacl/forcechangepassword","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"DACL abuse"}]},{"id":"752SuxxAjQYp35ZqdfCj","title":"Targeted Kerberoasting","pathname":"/ad/movement/dacl/targeted-kerberoasting","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"DACL abuse"}]},{"id":"BSygOruAqbN1Pemt6JpD","title":"WriteOwner","pathname":"/ad/movement/dacl/writeowner","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"DACL abuse"}]},{"id":"7mDGl3bN0kvhwZT1V6c8","title":"ReadLAPSPassword","pathname":"/ad/movement/dacl/readlapspassword","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"DACL abuse"}]},{"id":"2rS7vdkTBjfDpcUTgefk","title":"ReadGMSAPassword","pathname":"/ad/movement/dacl/readgmsapassword","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"DACL abuse"}]},{"id":"9mcs9EkLfS3bZ2fPVVTZ","title":"Grant ownership","pathname":"/ad/movement/dacl/grant-ownership","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"DACL abuse"}]},{"id":"3UopZnzdpJ4Rl5fGaZFq","title":"Grant rights","pathname":"/ad/movement/dacl/grant-rights","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"DACL abuse"}]},{"id":"jOlCmhm5VS8NQ0zf15nx","title":"Logon script","pathname":"/ad/movement/dacl/logon-script","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"DACL abuse"}]},{"id":"kGGDbNxeIWJexZ32P4Yp","title":"Rights on RODC object","pathname":"/ad/movement/dacl/rights-on-rodc-object","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"DACL abuse"}]},{"id":"32LF0UH8N0WEBf6lJA54","title":"BadSuccessor (dMSA abuse)","pathname":"/ad/movement/dacl/badsuccessor-dmsa-abuse","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"DACL abuse"}]},{"id":"Vz16RAYCELtRS3woaoWD","title":"Group policies","pathname":"/ad/movement/group-policies","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"}]},{"id":"1seUfuIL9EDfxzuNciZH","title":"Trusts","pathname":"/ad/movement/domain-trusts","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"}]},{"id":"Vpar3iWpy8iseI55skRu","title":"Certificate Services (AD-CS)","pathname":"/ad/movement/ad-cs","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"}]},{"id":"dehJQ8uLQdkkRtx6HaJT","title":"Certificate templates","pathname":"/ad/movement/ad-cs/certificate-templates","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Certificate Services (AD-CS)"}]},{"id":"VXzM7vIx72l5hiuHuniJ","title":"Certificate authority","pathname":"/ad/movement/ad-cs/certificate-authority","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Certificate Services (AD-CS)"}]},{"id":"jKkhAPyB5MYd6F0Ehbc8","title":"Access controls","pathname":"/ad/movement/ad-cs/access-controls","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Certificate Services (AD-CS)"}]},{"id":"WdTFjO9TC6ktfNM0e5UK","title":"Unsigned endpoints","pathname":"/ad/movement/ad-cs/unsigned-endpoints","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Certificate Services (AD-CS)"}]},{"id":"QKXqoZT0VQc076U3ksGY","title":"Certifried","pathname":"/ad/movement/ad-cs/certifried","siteSpaceId":"sitesp_6kTLM","description":"CVE-2022–26923","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Certificate Services (AD-CS)"}]},{"id":"6cVF0O2Mlu1Q0vbexF8b","title":"Schannel","pathname":"/ad/movement/schannel","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"}]},{"id":"oGibneM3AduDl28Vr4sG","title":"Pass the Certificate - Schannel","pathname":"/ad/movement/schannel/pass-the-certificate-schannel","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Schannel"}]},{"id":"s1CLbofPWsFtJQiWuzPF","title":"SCCM / MECM","pathname":"/ad/movement/sccm-mecm","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"}]},{"id":"Hz14Ni9gxKz6oRmi8rSZ","title":"Privilege Escalation","pathname":"/ad/movement/sccm-mecm/privilege-escalation","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"SCCM / MECM"}]},{"id":"CntLQ0MhQ4pmLbBgfU1r","title":"Post Exploitation","pathname":"/ad/movement/sccm-mecm/post-exploitation","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"SCCM / MECM"}]},{"id":"NjX83uHUrl6PiBtLrSJn","title":"Exchange services","pathname":"/ad/movement/exchange-services","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"}]},{"id":"ZPQX1vbLmFgVMpBKSblX","title":"PrivExchange","pathname":"/ad/movement/exchange-services/privexchange","siteSpaceId":"sitesp_6kTLM","description":"CVE-2018-8581","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Exchange services"}]},{"id":"mgQIhYbxhomz7aYraOd4","title":"ProxyLogon","pathname":"/ad/movement/exchange-services/proxylogon","siteSpaceId":"sitesp_6kTLM","description":"Chained CVE-2021-26855 and CVE-2021-27065","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Exchange services"}]},{"id":"f4Dg0ALrB7fF1RgtStLN","title":"ProxyShell","pathname":"/ad/movement/exchange-services/proxyshell","siteSpaceId":"sitesp_6kTLM","description":"Chained CVE-2021-34473, CVE-2021-34523, CVE-2021-31207","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Exchange services"}]},{"id":"qaSBIlpr0mFXRipvGdLt","title":"ProxyNotShell","pathname":"/ad/movement/exchange-services/proxynotshell","siteSpaceId":"sitesp_6kTLM","description":"Chained CVE-2022-41040, CVE-2022-41082","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Exchange services"}]},{"id":"zN9JG0UiKBH78hi46zSn","title":"Print Spooler Service","pathname":"/ad/movement/print-spooler-service","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"}]},{"id":"xbY0Qv75R92f4isZDTJ7","title":"PrinterBug","pathname":"/ad/movement/print-spooler-service/printerbug","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Print Spooler Service"}]},{"id":"Mv1UctcWd644UXXuq2RA","title":"PrintNightmare","pathname":"/ad/movement/print-spooler-service/printnightmare","siteSpaceId":"sitesp_6kTLM","description":"CVE-2021-1675 & CVE-2021-34527","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Print Spooler Service"}]},{"id":"MQyuzVbM1w6pccTC9LtU","title":"Built-ins & settings","pathname":"/ad/movement/domain-settings","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"}]},{"id":"ICJk1o2AOzvqIJolKL0i","title":"Builtin Groups","pathname":"/ad/movement/domain-settings/builtin-groups","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Built-ins & settings"}]},{"id":"kZl1fEHZq7zpzfnicx7m","title":"DNSAdmins","pathname":"/ad/movement/domain-settings/builtin-groups/dnsadmins","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Built-ins & settings"},{"label":"Builtin Groups"}]},{"id":"VMuKyWaWsoAL7qd2LVLo","title":"AD Recycle Bin","pathname":"/ad/movement/domain-settings/builtin-groups/ad-recycle-bin","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Built-ins & settings"},{"label":"Builtin Groups"}]},{"id":"ZNL5tAhiApVHCuBlNvmE","title":"MachineAccountQuota","pathname":"/ad/movement/domain-settings/machineaccountquota","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Built-ins & settings"}]},{"id":"zE7YcDxiyMkgAfKFop1z","title":"Pre-Windows 2000 computers","pathname":"/ad/movement/domain-settings/pre-windows-2000-computers","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Built-ins & settings"}]},{"id":"KGtsGURoKuXZlnWbzWqa","title":"RODC","pathname":"/ad/movement/domain-settings/rodc","siteSpaceId":"sitesp_6kTLM","description":"Read-Only Domain Controller","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Movement"},{"label":"Built-ins & settings"}]},{"id":"beSJIHryHJC3FcljVM0x","title":"Persistence","pathname":"/ad/persistence","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"}]},{"id":"ZM33hEkA9JbqC9fNdxrX","title":"Skeleton key","pathname":"/ad/persistence/skeleton-key","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Persistence"}]},{"id":"Wi5MYqoazf4IHyEeTbPc","title":"SID History","pathname":"/ad/persistence/sid-history","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Persistence"}]},{"id":"XV6SEdXtIQFeA82pE80j","title":"AdminSDHolder","pathname":"/ad/persistence/adminsdholder","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Persistence"}]},{"id":"wVcDRfydF4aGKpbwugPW","title":"GoldenGMSA","pathname":"/ad/persistence/goldengmsa","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Persistence"}]},{"id":"15pKcKDRfyrL2VkfzlWl","title":"Kerberos","pathname":"/ad/persistence/kerberos","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Persistence"}]},{"id":"2oPKsBvAiv3P5ulwhv0T","title":"Forged tickets","pathname":"/ad/persistence/kerberos/forged-tickets","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Persistence"},{"label":"Kerberos"}]},{"id":"dzcUN0ivz2oyz1bfdseK","title":"Delegation to KRBTGT","pathname":"/ad/persistence/kerberos/delegation-to-krbtgt","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Persistence"},{"label":"Kerberos"}]},{"id":"wwJhgGVUQrQU83lMbFSR","title":"Certificate Services (AD-CS)","pathname":"/ad/persistence/ad-cs","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Persistence"}]},{"id":"7X9JxiWrjTpDnGUJVXcM","title":"Certificate authority","pathname":"/ad/persistence/ad-cs/certificate-authority","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Persistence"},{"label":"Certificate Services (AD-CS)"}]},{"id":"qwrX3bMvo82xGA82qwzP","title":"Access controls","pathname":"/ad/persistence/ad-cs/access-controls","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Persistence"},{"label":"Certificate Services (AD-CS)"}]},{"id":"HsUpXAnWqyYU9DPDwtB6","title":"Golden certificate","pathname":"/ad/persistence/ad-cs/golden-certificate","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Persistence"},{"label":"Certificate Services (AD-CS)"}]},{"id":"NK5JNTVue1qc16oepnhH","title":"LAPS","pathname":"/ad/persistence/laps","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Persistence"}]},{"id":"t8GYGM8TfCStHO0U86vQ","title":"DC Shadow","pathname":"/ad/persistence/dcshadow","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Persistence"}]},{"id":"REn1cPOBjwkZQI2teaSy","title":"Access controls","pathname":"/ad/persistence/access-controls","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Active Directory Pentesting"},{"label":"Persistence"}]},{"id":"d6EzhUVAl7DIBea6OSCV","title":"On-Chain Analysis","pathname":"/smart-contracts-pentesting/on-chain-analysis","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Smart Contracts Pentesting"}]},{"id":"kPd7USxHz4DZxVIS9hCb","title":"Solidity Events Analysis","pathname":"/smart-contracts-pentesting/on-chain-analysis/solidity-events-analysis","siteSpaceId":"sitesp_6kTLM","description":"Leveraging Events for Blockchain Forensics and Investigation","breadcrumbs":[{"label":"Smart Contracts Pentesting"},{"label":"On-Chain Analysis"}]},{"id":"RzjY55Kr1URMPeczbLtM","title":"Transactions Analysis","pathname":"/smart-contracts-pentesting/on-chain-analysis/transactions-analysis","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Smart Contracts Pentesting"},{"label":"On-Chain Analysis"}]},{"id":"64X8DDVVxgl1sgkpSFyr","title":"Smart Contract Vulnerabilities","pathname":"/smart-contracts-pentesting/vulnerabilities","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Smart Contracts Pentesting"}]},{"id":"WFztYbbAVg3N92Y4Oahi","title":"EVM Attack Surfaces","pathname":"/smart-contracts-pentesting/vulnerabilities/evm-attack-surfaces","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Smart Contracts Pentesting"},{"label":"Smart Contract Vulnerabilities"}]},{"id":"JrczPSQVTJQ9X5ZVbgGL","title":"Sensitive Data Exposure","pathname":"/smart-contracts-pentesting/vulnerabilities/evm-attack-surfaces/sensitive-data-exposure","siteSpaceId":"sitesp_6kTLM","description":"SCWE-044: Insecure Use of Storage","breadcrumbs":[{"label":"Smart Contracts Pentesting"},{"label":"Smart Contract Vulnerabilities"},{"label":"EVM Attack Surfaces"}]},{"id":"jD6xT42zB9kUi8iAQxBw","title":"Solidity Metadata Exposure","pathname":"/smart-contracts-pentesting/vulnerabilities/evm-attack-surfaces/solidity-metadata-exposure","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Smart Contracts Pentesting"},{"label":"Smart Contract Vulnerabilities"},{"label":"EVM Attack Surfaces"}]},{"id":"DWB5xONYaLAEEE2sEglf","title":"Integer overflow/underflow","pathname":"/smart-contracts-pentesting/vulnerabilities/evm-attack-surfaces/integer-overflow-underflow","siteSpaceId":"sitesp_6kTLM","description":"SCWE-047: Integer Overflows and Underflows","breadcrumbs":[{"label":"Smart Contracts Pentesting"},{"label":"Smart Contract Vulnerabilities"},{"label":"EVM Attack Surfaces"}]},{"id":"M3CosI88ARCJGFSfuvD6","title":"Insecure DelegateCall","pathname":"/smart-contracts-pentesting/vulnerabilities/evm-attack-surfaces/insecure-delegatecall","siteSpaceId":"sitesp_6kTLM","description":"SCWE-035: Insecure Delegatecall Usage","breadcrumbs":[{"label":"Smart Contracts Pentesting"},{"label":"Smart Contract Vulnerabilities"},{"label":"EVM Attack Surfaces"}]},{"id":"UKz9jbOWzzwkyVZl0nQb","title":"Reentrancy","pathname":"/smart-contracts-pentesting/vulnerabilities/evm-attack-surfaces/reentrancy","siteSpaceId":"sitesp_6kTLM","description":"SCWE-046: Reentrancy Attacks","breadcrumbs":[{"label":"Smart Contracts Pentesting"},{"label":"Smart Contract Vulnerabilities"},{"label":"EVM Attack Surfaces"}]},{"id":"4MFxNwwJob8VPBhrQVpb","title":"Dynamic Array Underflow","pathname":"/smart-contracts-pentesting/vulnerabilities/evm-attack-surfaces/dynamic-array-underflow","siteSpaceId":"sitesp_6kTLM","description":"SCWE-124: Write to Arbitrary Storage Location","breadcrumbs":[{"label":"Smart Contracts Pentesting"},{"label":"Smart Contract Vulnerabilities"},{"label":"EVM Attack Surfaces"}]},{"id":"GmGi0QFz0sYGQN5fJArJ","title":"Hash Collisions (abi.encodePacked)","pathname":"/smart-contracts-pentesting/vulnerabilities/evm-attack-surfaces/hash-collisions-abi.encodepacked","siteSpaceId":"sitesp_6kTLM","description":"SCWE-074: Hash Collisions with Multiple Variable Length Arguments","breadcrumbs":[{"label":"Smart Contracts Pentesting"},{"label":"Smart Contract Vulnerabilities"},{"label":"EVM Attack Surfaces"}]},{"id":"RlaBImTCf1LvFUkiHcbD","title":"Contract Lifecycle & Upgradeability","pathname":"/smart-contracts-pentesting/vulnerabilities/contract-lifecycle-and-upgradeability","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Smart Contracts Pentesting"},{"label":"Smart Contract Vulnerabilities"}]},{"id":"8TvwdZFvL7HQsghbJXlW","title":"Incorrect Constructor Name","pathname":"/smart-contracts-pentesting/vulnerabilities/contract-lifecycle-and-upgradeability/incorrect-constructor-name","siteSpaceId":"sitesp_6kTLM","description":"SCWE-070: Incorrect Constructor Name","breadcrumbs":[{"label":"Smart Contracts Pentesting"},{"label":"Smart Contract Vulnerabilities"},{"label":"Contract Lifecycle & Upgradeability"}]},{"id":"x5xaPK6bkDbJVhtYfxO9","title":"Protocol Layer Attack Surfaces","pathname":"/smart-contracts-pentesting/vulnerabilities/protocol-layer-attack-surfaces","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Smart Contracts Pentesting"},{"label":"Smart Contract Vulnerabilities"}]},{"id":"qH4JhhNOqAFvStRxrHIR","title":"AMMs (Automated Market Makers)","pathname":"/smart-contracts-pentesting/vulnerabilities/protocol-layer-attack-surfaces/amms-automated-market-makers","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Smart Contracts Pentesting"},{"label":"Smart Contract Vulnerabilities"},{"label":"Protocol Layer Attack Surfaces","emoji":"1f6e0"}]},{"id":"aCQ3AI5HijFERHTGcCqF","title":"Oracles","pathname":"/smart-contracts-pentesting/vulnerabilities/protocol-layer-attack-surfaces/oracles","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Smart Contracts Pentesting"},{"label":"Smart Contract Vulnerabilities"},{"label":"Protocol Layer Attack Surfaces","emoji":"1f6e0"}]},{"id":"YhMw6k1Nw9lDchJXT7bE","title":"Lending Protocols","pathname":"/smart-contracts-pentesting/vulnerabilities/protocol-layer-attack-surfaces/lending-protocols","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Smart Contracts Pentesting"},{"label":"Smart Contract Vulnerabilities"},{"label":"Protocol Layer Attack Surfaces","emoji":"1f6e0"}]},{"id":"lotKJU8ua7ymSh2ADFUm","title":"Kubernetes","pathname":"/cloud-cicd-pentesting/kubernetes","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"}]},{"id":"cK4PszjoppeEJqU0cS4l","title":"Reconnaissance","pathname":"/cloud-cicd-pentesting/kubernetes/reconnaissance-and-enumeration","siteSpaceId":"sitesp_6kTLM","description":"Pentesting Kubernetes (K8S): Enumeration and Information Gathering from Inside and Outside the Cluster","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"Kubernetes"}]},{"id":"BfmtPgryyxsXBuX67rtH","title":"Initial Access","pathname":"/cloud-cicd-pentesting/kubernetes/initial-access","siteSpaceId":"sitesp_6kTLM","description":"Pentesting Kubernetes (K8S): Achieving Initial Access to a Kubernetes Cluster via Anonymous Access or Compromised Pods","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"Kubernetes"}]},{"id":"5itgEgojWA6D5f5p2CBy","title":"Privilege Escalation","pathname":"/cloud-cicd-pentesting/kubernetes/privesc-and-rbac-exploitation","siteSpaceId":"sitesp_6kTLM","description":"Pentesting Kubernetes (K8S): Privilege Escalation Vectors Inside a Kubernetes Cluster","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"Kubernetes"}]},{"id":"l9jiU3VFbJE6wIwcWBIo","title":"Persistence and Lateral Movement","pathname":"/cloud-cicd-pentesting/kubernetes/persistence-and-lateral-movement","siteSpaceId":"sitesp_6kTLM","description":"Pentesting Kubernetes (K8s): Persistence Mechanisms in Kubernetes Environments","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"Kubernetes"}]},{"id":"a9ISGRYfqs2mLMS3GI56","title":"Post-Exploitation","pathname":"/cloud-cicd-pentesting/kubernetes/data-exfiltration","siteSpaceId":"sitesp_6kTLM","description":"Pentesting Kubernetes (K8s): Post-Exploitation and Looting After Full Cluster Compromise","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"Kubernetes"}]},{"id":"5m1aas1aDJfGeSnwflTF","title":"CI/CD","pathname":"/cloud-cicd-pentesting/ci-cd","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"}]},{"id":"VF209qNk1RcHsO5SgDK9","title":"Ansible Pentesting","pathname":"/cloud-cicd-pentesting/ci-cd/ansible-pentesting","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"CI/CD"}]},{"id":"XId01FXoHeXa0HAsw1HG","title":"Artifactory Pentesting","pathname":"/cloud-cicd-pentesting/ci-cd/artifactory-pentesting","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"CI/CD"}]},{"id":"lop4ip5SyPSpAp3bs0aa","title":"Docker","pathname":"/cloud-cicd-pentesting/ci-cd/docker","siteSpaceId":"sitesp_6kTLM","description":"This chapter covers the basic theory around Docker containers security and how to escape them.","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"CI/CD"}]},{"id":"8o3NkOukCBMnaNewBzn5","title":"Docker Registry","pathname":"/cloud-cicd-pentesting/ci-cd/registry","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"CI/CD"}]},{"id":"4tUoX2kqRzGVJy7WvNPq","title":"HTTP API V2","pathname":"/cloud-cicd-pentesting/ci-cd/registry/apiv2","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"CI/CD"},{"label":"Docker Registry"}]},{"id":"GrCdtCbgMfqLjR0rL6zq","title":"GitLab","pathname":"/cloud-cicd-pentesting/ci-cd/gitlab","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"CI/CD"}]},{"id":"ambPE4WLQwAxC4Hi5S8N","title":"Github","pathname":"/cloud-cicd-pentesting/ci-cd/github","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"CI/CD"}]},{"id":"3tsTnT12JnEdf8Ksj0t6","title":"Gitea","pathname":"/cloud-cicd-pentesting/ci-cd/gitea","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"CI/CD"}]},{"id":"zw91Ui1nL6a4Ko9njPgI","title":"Jenkins","pathname":"/cloud-cicd-pentesting/ci-cd/jenkins","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"CI/CD"}]},{"id":"dKCBZKoKt7kycBGwdVGZ","title":"Terraform","pathname":"/cloud-cicd-pentesting/ci-cd/terraform","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"CI/CD"}]},{"id":"ukngOCvp4YCI5jnzGb4B","title":"Azure Pentesting","pathname":"/cloud-cicd-pentesting/azure-ad","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"}]},{"id":"o8KOWMJtyZ7SBzjwWmBG","title":"Reconnaissance","pathname":"/cloud-cicd-pentesting/azure-ad/reconnaissance","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"Azure Pentesting"}]},{"id":"4HgM5ctkvErEq7IX6QQz","title":"Tools ⚙️","pathname":"/cloud-cicd-pentesting/azure-ad/reconnaissance/tools","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"Azure Pentesting"},{"label":"Reconnaissance"}]},{"id":"FnnLGeVUEfWj81kww003","title":"Unauthenticated Reconnaissance","pathname":"/cloud-cicd-pentesting/azure-ad/reconnaissance/unauthenticated-reconnaissance","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"Azure Pentesting"},{"label":"Reconnaissance"}]},{"id":"z89Q9c59xsa5hPkyyJQM","title":"Internal Reconnaissance","pathname":"/cloud-cicd-pentesting/azure-ad/reconnaissance/internal-reconnaissance","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"Azure Pentesting"},{"label":"Reconnaissance"}]},{"id":"AvTrZSx3ICMLYNPd5UMw","title":"Movement","pathname":"/cloud-cicd-pentesting/azure-ad/movement","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"Azure Pentesting"}]},{"id":"Yia6Q4WoELAaZUKBrvj2","title":"Credentials","pathname":"/cloud-cicd-pentesting/azure-ad/movement/credentials","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"Azure Pentesting"},{"label":"Movement","emoji":"1f6e0"}]},{"id":"2ZBZy6mDU0O7r1XtCLq9","title":"Password Spraying","pathname":"/cloud-cicd-pentesting/azure-ad/movement/credentials/password-spraying","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"Azure Pentesting"},{"label":"Movement","emoji":"1f6e0"},{"label":"Credentials"}]},{"id":"XP5Qn7z8jrwcYHaxoFmE","title":"Token Manipulation","pathname":"/cloud-cicd-pentesting/azure-ad/movement/credentials/token-manipulation","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"Azure Pentesting"},{"label":"Movement","emoji":"1f6e0"},{"label":"Credentials"}]},{"id":"ZC4jFXsOc7a3q2H7llR4","title":"Pass-The-Cookie (PTC)","pathname":"/cloud-cicd-pentesting/azure-ad/movement/credentials/token-manipulation/pass-the-cookie-ptc","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"Azure Pentesting"},{"label":"Movement","emoji":"1f6e0"},{"label":"Credentials"},{"label":"Token Manipulation"}]},{"id":"MVdlHuOebGKuAYhxFxrH","title":"Pass the Certificate (Azure)","pathname":"/cloud-cicd-pentesting/azure-ad/movement/credentials/token-manipulation/pass-the-certificate-azure","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"Azure Pentesting"},{"label":"Movement","emoji":"1f6e0"},{"label":"Credentials"},{"label":"Token Manipulation"}]},{"id":"PfDAOcfMnCSX40hiHo18","title":"Pass the PRT","pathname":"/cloud-cicd-pentesting/azure-ad/movement/credentials/token-manipulation/pass-the-prt","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"Azure Pentesting"},{"label":"Movement","emoji":"1f6e0"},{"label":"Credentials"},{"label":"Token Manipulation"}]},{"id":"ENSYeSzu8ynJnfNF0jLg","title":"Aazure Resources","pathname":"/cloud-cicd-pentesting/azure-ad/movement/aazure-resources","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"Azure Pentesting"},{"label":"Movement","emoji":"1f6e0"}]},{"id":"MpRLSd5miuHR4fKPG1cS","title":"Key Vault","pathname":"/cloud-cicd-pentesting/azure-ad/movement/aazure-resources/key-vault","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"Azure Pentesting"},{"label":"Movement","emoji":"1f6e0"},{"label":"Aazure Resources"}]},{"id":"4xnN4ZRUoru9eSAasqHW","title":"Storage Accounts","pathname":"/cloud-cicd-pentesting/azure-ad/movement/aazure-resources/storage-accounts","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"Azure Pentesting"},{"label":"Movement","emoji":"1f6e0"},{"label":"Aazure Resources"}]},{"id":"3Nk6BzNWrhfi5n6o0Xlr","title":"Virtual Machines","pathname":"/cloud-cicd-pentesting/azure-ad/movement/aazure-resources/virtual-machines","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"Azure Pentesting"},{"label":"Movement","emoji":"1f6e0"},{"label":"Aazure Resources"}]},{"id":"5ZYjR0V1SMtou08mRWE1","title":"Automation","pathname":"/cloud-cicd-pentesting/azure-ad/movement/aazure-resources/automation","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"Azure Pentesting"},{"label":"Movement","emoji":"1f6e0"},{"label":"Aazure Resources"}]},{"id":"LzrBHunaqBESgx6keUMY","title":"Databases","pathname":"/cloud-cicd-pentesting/azure-ad/movement/aazure-resources/databases","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"Azure Pentesting"},{"label":"Movement","emoji":"1f6e0"},{"label":"Aazure Resources"}]},{"id":"ihsUGzj2wuVDq7ic4tU0","title":"Role-Based Access","pathname":"/cloud-cicd-pentesting/azure-ad/movement/role-based-access","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"Azure Pentesting"},{"label":"Movement","emoji":"1f6e0"}]},{"id":"HzZk5wKIpnH221tJ37Fv","title":"Conditional Access","pathname":"/cloud-cicd-pentesting/azure-ad/movement/conditional-access","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"Azure Pentesting"},{"label":"Movement","emoji":"1f6e0"}]},{"id":"K4KLlcv6gRKLTsZf8muv","title":"Service Principals & Applications","pathname":"/cloud-cicd-pentesting/azure-ad/movement/service-principals-and-applications","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"Azure Pentesting"},{"label":"Movement","emoji":"1f6e0"}]},{"id":"wyyr5kjbL3m6ndevFPRy","title":"Hybrid Identity","pathname":"/cloud-cicd-pentesting/azure-ad/movement/hybrid-identity","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"Azure Pentesting"},{"label":"Movement","emoji":"1f6e0"}]},{"id":"9vCHrRxxrW2nOXQ4rf06","title":"Password Hash Sync (PHS)","pathname":"/cloud-cicd-pentesting/azure-ad/movement/hybrid-identity/password-hash-sync-phs","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"Azure Pentesting"},{"label":"Movement","emoji":"1f6e0"},{"label":"Hybrid Identity"}]},{"id":"tR8osM7Tp8q0hITzHLih","title":"Pass-through Authentication (PTA)","pathname":"/cloud-cicd-pentesting/azure-ad/movement/hybrid-identity/pass-through-authentication-pta","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"Azure Pentesting"},{"label":"Movement","emoji":"1f6e0"},{"label":"Hybrid Identity"}]},{"id":"DCu4m5OdMPzeKL3N7ZHX","title":"Active Directory Federation Services (ADFS)","pathname":"/cloud-cicd-pentesting/azure-ad/movement/hybrid-identity/active-directory-federation-services-adfs","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"Azure Pentesting"},{"label":"Movement","emoji":"1f6e0"},{"label":"Hybrid Identity"}]},{"id":"CO8v34wKwfquA2OQs9rK","title":"Seamless SSO","pathname":"/cloud-cicd-pentesting/azure-ad/movement/hybrid-identity/seamless-sso","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"Azure Pentesting"},{"label":"Movement","emoji":"1f6e0"},{"label":"Hybrid Identity"}]},{"id":"30kL5Cwp9qUTEtWLKRcJ","title":"Cloud Kerberos Trust","pathname":"/cloud-cicd-pentesting/azure-ad/movement/hybrid-identity/cloud-kerberos-trust","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"Azure Pentesting"},{"label":"Movement","emoji":"1f6e0"},{"label":"Hybrid Identity"}]},{"id":"pqjEjmBrsQ2O2xSbqin9","title":"Cross-Tenant Access","pathname":"/cloud-cicd-pentesting/azure-ad/movement/cross-tenant-access","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"Azure Pentesting"},{"label":"Movement","emoji":"1f6e0"}]},{"id":"HrYKzxuKK5usVuVvmLlE","title":"Persistence","pathname":"/cloud-cicd-pentesting/azure-ad/persistence","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"Azure Pentesting"}]},{"id":"vUhWRU4ic4VYqxz9soXe","title":"AWS Pentesting","pathname":"/cloud-cicd-pentesting/aws","siteSpaceId":"sitesp_6kTLM","description":"","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"}]},{"id":"Eu039uoEfWvI7L8ZoNOC","title":"Reconnaissance","pathname":"/cloud-cicd-pentesting/aws/reconnaissance","siteSpaceId":"sitesp_6kTLM","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"AWS Pentesting"}]},{"id":"jAVTj1uY9dZcxXjGGT04","title":"Unauthenticated Enumeration","pathname":"/cloud-cicd-pentesting/aws/reconnaissance/unauthenticated-enumeration","siteSpaceId":"sitesp_6kTLM","description":"Unauthenticated AWS Enumeration","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"AWS Pentesting"},{"label":"Reconnaissance"}]},{"id":"kdrAaIJyVabVhzKus79b","title":"Movement","pathname":"/cloud-cicd-pentesting/aws/movement","siteSpaceId":"sitesp_6kTLM","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"AWS Pentesting"}]},{"id":"KDaiOaP1JjV49l1qUbNZ","title":"AWS IAM","pathname":"/cloud-cicd-pentesting/aws/movement/aws-iam","siteSpaceId":"sitesp_6kTLM","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"AWS Pentesting"},{"label":"Movement"}]},{"id":"hyzjCD6x7OreCgtOborD","title":"Users & Groups","pathname":"/cloud-cicd-pentesting/aws/movement/aws-iam/users-and-groups","siteSpaceId":"sitesp_6kTLM","description":"AWS IAM Users & Groups","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"AWS Pentesting"},{"label":"Movement"},{"label":"AWS IAM"}]},{"id":"OKHuLZacJ6AnBHEIOL1U","title":"Roles & AssumeRole","pathname":"/cloud-cicd-pentesting/aws/movement/aws-iam/roles-and-assumerole","siteSpaceId":"sitesp_6kTLM","description":"AWS IAM Roles & AssumeRole","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"AWS Pentesting"},{"label":"Movement"},{"label":"AWS IAM"}]},{"id":"434A4DcZrKaa82bPUWKg","title":"Access Keys","pathname":"/cloud-cicd-pentesting/aws/movement/aws-iam/access-keys","siteSpaceId":"sitesp_6kTLM","description":"AWS IAM Access Keys","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"AWS Pentesting"},{"label":"Movement"},{"label":"AWS IAM"}]},{"id":"DN8CAPrfMNIpRuR0vL0G","title":"Policies","pathname":"/cloud-cicd-pentesting/aws/movement/aws-iam/policies","siteSpaceId":"sitesp_6kTLM","description":"AWS IAM Policies","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"AWS Pentesting"},{"label":"Movement"},{"label":"AWS IAM"}]},{"id":"dLxRvgPRZlpmgPJErWgC","title":"PassRole & Service Principals","pathname":"/cloud-cicd-pentesting/aws/movement/aws-iam/passrole-and-service-principals","siteSpaceId":"sitesp_6kTLM","description":"AWS IAM: PassRole & Service Principals","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"AWS Pentesting"},{"label":"Movement"},{"label":"AWS IAM"}]},{"id":"qcZQHFK1CtAVmJHsB3gu","title":"MFA","pathname":"/cloud-cicd-pentesting/aws/movement/aws-iam/mfa","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"AWS Pentesting"},{"label":"Movement"},{"label":"AWS IAM"}]},{"id":"j8cqQ2oyJac6hTBRJP8E","title":"Identity Center","pathname":"/cloud-cicd-pentesting/aws/movement/aws-iam/identity-center","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"AWS IAM Identity Center","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"AWS Pentesting"},{"label":"Movement"},{"label":"AWS IAM"}]},{"id":"05vQ9WwPoLkgWr8Akq6m","title":"Federation (SAML & OIDC)","pathname":"/cloud-cicd-pentesting/aws/movement/aws-iam/federation-saml-and-oidc","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"AWS IAM Federation","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"AWS Pentesting"},{"label":"Movement"},{"label":"AWS IAM"}]},{"id":"7HHlVi9QP7NPRgbRJ76o","title":"Persistence","pathname":"/cloud-cicd-pentesting/aws/persistence","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"},{"label":"AWS Pentesting"}]},{"id":"hHSwJLtCqxTkg6Axuehm","title":"GCP Pentesting","pathname":"/cloud-cicd-pentesting/gcp-pentesting","siteSpaceId":"sitesp_6kTLM","emoji":"1f6e0","description":"","breadcrumbs":[{"label":"Cloud & CI/CD Pentesting"}]}]}