Executing DLL’s from memory.
Injecting DLL’s into remote processes.
Writing stagers to interact with foreign C2 frameworks.
A Metasploit command reference.
Changing default security descriptor properties to escalate from a child to parent domain.
Exploiting common Tomcat vulnerabilities.
Adding additional security auditing tools to Kali.
Compromising MSSQL databases, and escalating privileges.
Extracting gMSA service accounts from child domains.
Modifying SID History values to compromise parent domains.
Extracting domain controller credentials using the Backup Operators group.
Using Microsoft AD Explorer to collect Active Directory attack path information.
Exploiting misconfigured Active Directory access control lists.
Maintaining access to a target system.
Extracting credentials from Azure Entra Connect.
Using password filters to intercept logon credentials.
Persuading Windows hosts to provide machine account credentials.
Using LD_PRELOAD for dynamic function hooking and privilege escalation.