Skip to main content

Documentation Index

Fetch the complete documentation index at: https://rootea.es/llms.txt

Use this file to discover all available pages before exploring further.

Json

··
Operating systemWindows
DifficultyMedium
IP10.10.10.158
Retirement date
SkillsAbusing No Redirect Json Deserialization Exploitation - ysoserial.net [RCE] AppLocker Bypass Abusing SeImpersonatePrivilege - JuicyPotato [Privilege Escalation] Abusing SeImpersonatePrivilege - Creating a new user Abusing SeImpersonatePrivilege - Adding the user to the local administrators group Abusing SeImpersonatePrivilege - Modifying the registry entry LocalAccountTokenFilterPolicy Playing with psexec.py and wmiexec.py PassTheHash - wmiexec.py Executing commands with CrackMapExec Dumping the SAM with CrackMapExec Enabling RDP with CrackMapExec Playing with Remmina to gain access to the system

Writeups

LanguageAuthorFormatLink
🇪🇸 ESS4vitarVídeoOpen
🇬🇧 EN0xdfTextoOpen
🇬🇧 ENIppSecVídeoOpen

Skill resources

Curated documentation for each technique listed in the Skills column above. Sources: HackTricks, GTFOBins, PortSwigger, etc.
SkillSourceLink
Remote Code Execution (RCE)HackTricksOpen