Exploit Development Windows User Mode WinDbg
WinDbg Although there are many debuggers today, such as Immunity Debugger or x32dbg, one thing that WinDbg offers, unlike these, is support for x64 architecture. Additionally, it can debug program...
WinDbg Although there are many debuggers today, such as Immunity Debugger or x32dbg, one thing that WinDbg offers, unlike these, is support for x64 architecture. Additionally, it can debug program...
Stack Overflow Once we understand the basic [fundamentals] (https://r00tven0m.github.io/posts/Exploit-Development-Windows-User-Mode-Fundamentals/) of exploitation and why a Buffer Overflow occurs,...
Fundamentos Before moving on to exploitation, it is necessary to learn some basic concepts. Exploitations will be carried out on the x86 architecture since knowing how it is done on this architect...
INTRODUCTION This paper will discuss methods that penetration testers can employ to gain initial access to target networks and compromise the entire domain without relying on third-party applicati...
In this article, I will explain the third technique for establishing persistence on the Domain Controller Skeleton Key Attack What is the Skeleton Key technique The Skeleton Key technique involves...
The Windows Server operating system uses two types of security principals for authentication and authorization: user accounts and computer accounts. These accounts are created to represent physical...
Windows Built-in Groups Windows Built-in Groups are predefined groups that come preconfigured with Windows operating systems. These groups serve specific purposes and are used for managing permiss...