Giovanni Pecoraro
Giovanni Pecoraro
Home
Posts
Projects
Talks
Publications
Contact
Light
Dark
Automatic
Cyber Security
Windows Management Instrumentation cheatsheet
Windows Management Instrumentation (WMI) provides a unique interface to manage a local or remote network or computer and thus can be used by both Red and Blue Teams.
Giovanni Pecoraro
Sep 29, 2022
24 min read
Cyber Security
,
Red Teaming
Microsoft SQL Server cheatsheet
MSSQL Servers integrate right out the box with Windows and Active Directory Domains. Consequently, there are trust relationships wich we can be leveraged from an attacker perspective.
Giovanni Pecoraro
Sep 22, 2022
22 min read
Cyber Security
,
Red Teaming
Across Forests cheatsheet
Active Directory forests are the highest level of security boundary for network objects in the Active Directory tree and forest structure. Within this Active Directory hierarchy, a forest is considered the most important logical container in an Active Directory configuration.
Giovanni Pecoraro
Sep 15, 2022
2 min read
Cyber Security
,
Red Teaming
Across Domain Trusts cheatsheet
Trusts are relationships between domains or forests which allows users of one domain or forest to access resources in the other domain or forest.
Giovanni Pecoraro
Sep 8, 2022
3 min read
Cyber Security
,
Red Teaming
Domain Persistence cheatsheet
Domain persistence consists of techniques that adversaries use to maintain access the Active Directory environment across restarts, changed credentials, and other interruptions that could cut off their access.
Giovanni Pecoraro
Sep 1, 2022
7 min read
Cyber Security
,
Red Teaming
Mimikatz cheatsheet
Mimikatz is an open-source application that allows users to view and save authentication credentials such as Kerberos tickets. The toolset works with the current release of Windows and includes a collection of different network attacks to help assess vulnerabilities.
Giovanni Pecoraro
Aug 7, 2022
6 min read
Cyber Security
,
Red Teaming
Domain Privilege Escalation cheatsheet
Once an adversary has gained an initial foothold in the network, they will seek to escalate their privileges and compromise additional systems to locate sensitive data and other critical resources.
Giovanni Pecoraro
Jul 31, 2022
11 min read
Cyber Security
,
Red Teaming
Domain Lateral Movement cheatsheet
Lateral movement refers to the techniques that an attacker can use, after gaining initial access, to move deeper into a network in search of sensitive data and other high-value assets.
Giovanni Pecoraro
Jul 24, 2022
7 min read
Cyber Security
,
Red Teaming
Domain Enumeration cheatsheet
Domain enumeration is the process of extracting information from the Active Directory like enumerating the users, groups, and other interesting fields and resources.
Giovanni Pecoraro
Jul 17, 2022
12 min read
Cyber Security
,
Red Teaming
Cite
×