- Week of Evading Microsoft ATA - Announcement and Day 1 http://www.labofapenetrationtester.com/2017/08/week-of-evading-microsoft-ata-day1.html 6 comments netsec
- Abusing DNSAdmins privilege for escalation in Active Directory http://www.labofapenetrationtester.com/2017/05/abusing-dnsadmins-privilege-for-escalation-in-active-directory.html 6 comments netsec
- Exfiltration of User Credentials using WLAN SSID http://www.labofapenetrationtester.com/2016/11/exfiltration-of-user-credentials-using-wlan-ssid.html 5 comments netsec
- AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It http://www.labofapenetrationtester.com/2016/09/amsi.html 21 comments netsec
- Getting Domain Admin with Kerberos Unconstrained Delegation http://www.labofapenetrationtester.com/2016/02/getting-domain-admin-with-kerberos-unconstrained-delegation.html 10 comments netsec
- Stream a target's Desktop using MJPEG and PowerShell http://www.labofapenetrationtester.com/2015/12/stream-targets-desktop-using-mjpeg-and-powershell.html 17 comments netsec
- Week of Continuous Intrusion - Day 1 - Jenkins http://www.labofapenetrationtester.com/2015/11/week-of-continuous-intrusion-day-1.html 9 comments netsec
- Bypassing UAC with PowerShell http://www.labofapenetrationtester.com/2015/09/bypassing-uac-with-powershell.html 26 comments netsec
- Abusing Web Query (.iqy) files for effective phishing http://www.labofapenetrationtester.com/2015/08/abusing-web-query-iqy-files.html 6 comments netsec
- Week of PowerShell Shells - Day 1 - TCP Shell http://www.labofapenetrationtester.com/2015/05/week-of-powershell-shells-day-1.html 9 comments netsec
- Dumping user passwords in plaintext on Windows 8.1 and Server 2012 http://www.labofapenetrationtester.com/2015/05/dumping-passwords-in-plain-on-windows-8-1.html 3 comments netsec
- Pillage the Village - The PowerShell version http://www.labofapenetrationtester.com/2015/04/pillage-the-village-powershell-version.html 8 comments netsec
- Using Windows Screensaver as a Backdoor with PowerShell http://www.labofapenetrationtester.com/2015/02/using-windows-screensaver-as-backdoor.html 16 comments netsec
- Dropping infected/weaponized files using a Human Interface Device http://www.labofapenetrationtester.com/2015/01/dropping-weaponized-files-using-hid.html 19 comments netsec
- Using PowerShell for Client Side Attacks http://www.labofapenetrationtester.com/2014/11/powershell-for-client-side-attacks.html 13 comments netsec
- Introducing Gupt: A Backdoor which uses Wireless network names for command execution http://www.labofapenetrationtester.com/2014/08/introducing-gupt.html 25 comments netsec
- Script Execution and Privilege Escalation on Jenkins Server http://www.labofapenetrationtester.com/2014/08/script-execution-and-privilege-esc-jenkins.html 8 comments netsec
- Pivoting to and poking other computers using powershell http://www.labofapenetrationtester.com/2013/09/powerpreter-and-nishang-part-2.html 11 comments netsec