Saltar al contenido principal

Documentation Index

Fetch the complete documentation index at: https://rootea.es/llms.txt

Use this file to discover all available pages before exploring further.

Json

··
Sistema operativoWindows
DificultadMedio
IP10.10.10.158
Fecha de retirada
SkillsAbusing No Redirect Json Deserialization Exploitation - ysoserial.net [RCE] AppLocker Bypass Abusing SeImpersonatePrivilege - JuicyPotato [Privilege Escalation] Abusing SeImpersonatePrivilege - Creating a new user Abusing SeImpersonatePrivilege - Adding the user to the local administrators group Abusing SeImpersonatePrivilege - Modifying the registry entry LocalAccountTokenFilterPolicy Playing with psexec.py and wmiexec.py PassTheHash - wmiexec.py Executing commands with CrackMapExec Dumping the SAM with CrackMapExec Enabling RDP with CrackMapExec Playing with Remmina to gain access to the system

Writeups

IdiomaAutorFormatoEnlace
🇪🇸 ESS4vitarVídeoAbrir
🇬🇧 EN0xdfTextoAbrir
🇬🇧 ENIppSecVídeoAbrir

Recursos por skill

Documentación curada para cada técnica que aparece en la columna Skills de arriba. Fuentes: HackTricks, GTFOBins, PortSwigger, etc.
SkillFuenteEnlace
Remote Code Execution (RCE)HackTricksAbrir