CARE TO BE AWARE
Join date: Feb 26, 2021
Jul 25, 2021 ∙ 2 min
Impersonating & Altering privilege with Windows Tokens
Introduction Getting privileged access is an important aspect for red team. There are many tools, methods and techniques to get shell for...
May 2, 2021 ∙ 2 min
Named Pipe Pass-The-Hash | Impersonating lower privilege accounts
Named pipes are used to permit asynchronous or synchronous inter-process communication (IPC) on the same computer or on different...