[KOR] 윈도우 액티브 디렉토리 포스트 익스플로잇

노트정리도 커버페이지가 좋으면 보기 좋더라 윈도우 액티브 디렉토리 포스트-익스플로잇 노트 다운로드 블로그 글이 아니라 공부한 것을 정리한 문서를 올리는 용도의 블로그글이라 다운로드 링크를 맨 위에 남긴다. 백서는 아니고 그냥 개인 노트 정도라고 생각하면 좋겠다. https://drive.google.com/file/d/1UVPKy1OuTG0aKlvp4-4w498FZrpMEYQG/view?usp=sharing Winter is Coming 겨울이 다가오고 있다.…

Remote Template Injection

This blog post is a clone of my upcoming redteam gitbook project that I'm currently working on. Link TBD... Purpose The purpose of this page is to briefly explain what Remote Template Injection is, and actually create a PoC  based on the technique. Remote Template Injection Microsoft Word has a…

WinAPI, Covenant, Donut, and Custom Dropper

Summary Covenant dropper in action For the past couple of days, I have finally decided to dive deeper into the world of custom payload generation. So I have created a very simple custom dropper utilizing WinAPI [https://docs.microsoft.com/en-us/windows/win32/apiindex/windows-api-list] through C++, Covenant agent [https:…

I Created a Fake Company Infrastructure for Student Club Members to Hack

< This post have been updated with a new URL because me and my colleague decided to change some content. > Please go here, sorry! - https://blog.sunggwanchoi.com/we-created-a-fake-company-infrastructure/ [https://blog.sunggwanchoi.com/we-created-a-fake-company-infrastructure/] Summary As current leaders of Rochester Institute of Technology's Penetration Testing group (RVAPT), my colleague and…

시나리오 기반의 모의침투테스트 대회를 진행하며

요약 (영어가 편하신 분들 or If you are an English speaker, please read the english version of this article here - https://blog.sunggwanchoi.com/we-created-a-fake-company-infrastructure/ [https://blog.sunggwanchoi.com/we-created-a-fake-company-infrastructure/]) 2020년 봄학기 1월 초, 나와 내 친구는 학교의 취약점 진단 및 모의침투테스트 그룹의 공동리더가 됐다. 이 기회를 살려 실제…

We Created a Fake Company Infrastructure for Student Club Members to Hack

Summary As current leaders of Rochester Institute of Technology's Penetration Testing group (RVAPT), my colleague and I created a mini-competition that simulated a fake organization's IT infrastructure for the students to do a penetration testing on. With the help of my colleague and co-leader of RVAPT, Mohammed Alshehri(twitter) [https:…

RVAPT - 6 - Post Exploitation

Note - Where's RVAPT 2~5 ?! The RVAPT blog series were suppose to be updated over the spring break (3/9~3/16). However, due to the corona virus outbreak, my entire schedule and to-do lists have gone through rapid changes.  RVAPT education schedule itself became a bit of mess…