Skip to content

Commit

Permalink
Fix typos
Browse files Browse the repository at this point in the history
  • Loading branch information
chvancooten committed Aug 10, 2023
1 parent 3972ac9 commit 694a001
Show file tree
Hide file tree
Showing 2 changed files with 3 additions and 3 deletions.
2 changes: 1 addition & 1 deletion content/posts/OSEPReview.md
Expand Up @@ -14,7 +14,7 @@ tags = [
name = "Cas van Cooten"
+++

*Updated **February 13th, 2023**: Some referenced courses are now licensed by AlteredSecurity instead of PentesterAcademy, this post has been udpated to reflect.*
*Updated **February 13th, 2023**: Some referenced courses are now licensed by AlteredSecurity instead of PentesterAcademy, this post has been updated to reflect.*

## Introduction

Expand Down
4 changes: 2 additions & 2 deletions content/posts/WinADCheatSheet.md
Expand Up @@ -144,7 +144,7 @@ Powershell -EncodedCommand $encodedCommand

### AD Enumeration With PowerView

Though the below gives a good reperesentation of the commands that usually come in most useful for me, this only scratches the surface of what PowerView can do. PowerView is available [here](https://github.com/PowerShellMafia/PowerSploit/blob/master/Recon/PowerView.ps1).
Though the below gives a good representation of the commands that usually come in most useful for me, this only scratches the surface of what PowerView can do. PowerView is available [here](https://github.com/PowerShellMafia/PowerSploit/blob/master/Recon/PowerView.ps1).

```powershell
# Get all users in the current domain
Expand Down Expand Up @@ -402,7 +402,7 @@ Invoke-TokenManipulation -CreateProcess "C:\Windows\system32\calc.exe" -ProcessI

### Lateral Movement with Rubeus

We can use Rubeus to execute a technique called "Overpass-the-Hash". In this technique, instead of passing the hash directly (another technique known as Pass-the-Hash), we use the NTLM hash of an account to request a valid Kerberost ticket (TGT). We can then use this ticket to authenticate towards the domain as the target user.
We can use Rubeus to execute a technique called "Overpass-the-Hash". In this technique, instead of passing the hash directly (another technique known as Pass-the-Hash), we use the NTLM hash of an account to request a valid Kerberos ticket (TGT). We can then use this ticket to authenticate towards the domain as the target user.

```powershell
# Request a TGT as the target user and pass it into the current session
Expand Down

0 comments on commit 694a001

Please sign in to comment.