- Network Mapping with PowerShell
- Location & Date: Romanian PowerShell User Group - February 28th 2017
- Description : How to discover hosts and services on the local network with PowerShell in a post-exploitation scenario
- From Developer To Domain Admin
- Location & Date:
- Security Espresso - April 19th 2017 (Recording here. I start at the 1:09:45 mark. The presentation is done in Romanian)
- Romanian PowerShell User Group - May 23rd 2017
- Description:
Developers usually have local admin rights this makes them a high-profile target for attackers. In a post-exploitation scenario, I'll demonstrate how to leverage PowerShell as an attacker with the goal of achieving domain admin rights. A non-exhaustive list of topics includes the following:
- Perform reconnaissance on local machine
- Scan the internal network for additional hosts and services
- Bypass UAC
- Proof of concept host-based IPS
- Elevate current user to Domain Admin
- Location & Date:
-
Notifications
You must be signed in to change notification settings - Fork 0
z00v4sh/Talks
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
About
No description, website, or topics provided.
Resources
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published