Abusing DCOM For Yet Another Lateral Movement Technique Logo

Abusing DCOM For Yet Another Lateral Movement Technique

0
Free
Visit Website

This post discusses an alternate DCOM lateral movement discovery and payload execution method by locating DCOM registry key/values that point to the path of a non-existing binary on the 'remote' machine, providing an example method that may work if mobsync.exe is not in the default location on Windows 2008 R2 and Windows 2012 R2 systems.

FEATURES

ALTERNATIVES

An open-source shellcode and PE packer for creating and managing portable executable files.

A tool that finds more information about a given URL or domain by querying multiple data sources.

Open-source project for building instrumented environments to simulate attacks and test detections.

Repository of tools for testing iPhone messaging by Project Zero

XAHICO Web Platform is a cloud-based solution for vulnerability detection, penetration testing, and adversary simulation, accessible through web browsers and suitable for various user levels.

Pentest active directory LAB project for practicing attack techniques.

A post-exploitation framework for attacking running AWS infrastructure

A cross-platform tool for creating malicious MS Office documents with hidden VBA macros and anti-analysis features.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved