HACKING SOUS WINDOWS
▬▬▬▬▬▬▬ 📌 Prérequis ▬▬▬▬▬▬▬ ► Comprendre l'Active Directory (Cookie Connecté ): https://www.youtube.com/watch?v=nhW-0qZzjy4&t=88s ► Comprendre Powershell : https://docs.microsoft.com/en-us/powershell/scripting/overview?view=powershell-7.2 ► L'authentification sous windows et limitations (Processus Thief ): https://www.youtube.com/watch?v=Z32UhxE29LU ► Hacking et sécurité - Attaque AD et Web (Hemza Kondah) : https://www.alphorm.com/tutoriel/formation-en-ligne-hacking-et-securite-2020-4-4-attaques-ad-et-web ▬▬▬▬▬▬▬ 🧰Les suites importantes ▬▬▬▬▬▬▬ ► Impacket : https://github.com/SecureAuthCorp/impacket ► Sysinternals : https://docs.microsoft.com/en-us/sysinternals/downloads/ ► Powersploit : https://github.com/PowerShellMafia/PowerSploit ▬▬▬▬▬▬▬ 📚 Guide pour l'énumération ▬▬▬▬▬▬▬ ► Nmap Scripting Engine : https://nmap.org/nsedoc/scripts/http-enum.html ► Hacktricks : https://book.hacktricks.xyz/windows/checklist-windows-privilege-escalation ► Ired.team : https://www.ired.team/offensive-security-experiments/offensive-security-cheetsheets ▬▬▬▬▬▬▬ 💻 Exploitation ▬▬▬▬▬▬▬ ► Searchsploit : https://www.exploit-db.com/searchsploit ► Metasploit : https://www.metasploit.com ► Bloodhound : https://github.com/BloodHoundAD/BloodHound ▬▬▬▬▬▬▬ 🕹 Labs ▬▬▬▬▬▬▬ ►Metasploitable 2 : https://docs.rapid7.com/metasploit/metasploitable-2/ ►Vulnhub : https://www.vulnhub.com/entry/web-machine-n7,756/ ----------------------------------------------------------------------------------------------------------------------------------------------------- ► Facebook: https://www.facebook.com/wakedxy/ ► Twitter : https://twitter.com/Wakedxy1 ► Discord: https://discord.gg/ad5pTng ► Github: https://github.com/wakedxy ► Instagram: https://www.instagram.com/wakedxy/ #hacking #windows #kalilinux
Download
0 formatsNo download links available.