Skip to main content

Documentation Index

Fetch the complete documentation index at: https://rootea.es/llms.txt

Use this file to discover all available pages before exploring further.

Blue

··
Operating systemWindows
DifficultyEasy
IP10.10.10.40
Retirement date2017-09-09
SkillsSMB Enumeration Eternalblue Exploitation (MS17-010) [Triple Z Exploit] Obtaining credentials stored in memory [MIMIKATZ + Windows Defender Evasion] (EXTRA) Enabling RDP from CrackMapExec (EXTRA) Windows Persistence techniques (EXTRA) Windows Persistence - Playing with debugger [When a user opens a program] (EXTRA) Windows Persistence - Playing with Gflags [When a user closes a program] (EXTRA) Windows Persistence - Playing with WMI Events [Executing tasks at regular intervals of time] (EXTRA) Persistence + Windows Defender Evasion [Playing with Ebowla] (EXTRA)

Writeups

LanguageAuthorFormatLink
🇪🇸 ESS4vitarVídeoOpen
🇬🇧 EN0xdfTextoOpen
🇬🇧 ENIppSecVídeoOpen

Skill resources

Curated documentation for each technique listed in the Skills column above. Sources: HackTricks, GTFOBins, PortSwigger, etc.
SkillSourceLink
EternalBlue (MS17-010)HackTricksOpen