Reading-List

A collection of articles I've read and enjoyed

Below is a list of articles / websites which I’ve read and enjoyed. I recommend you check them out!

https://swisskyrepo.github.io/InternalAllTheThings/redteam/evasion/linux-evasion/#timestomping

https://swisskyrepo.github.io/InternalAllTheThings/redteam/evasion/windows-amsi-bypass/#summary

https://swisskyrepo.github.io/InternalAllTheThings/active-directory/kerberos-tickets/#pass-the-ticket-golden-tickets

https://swisskyrepo.github.io/InternalAllTheThings/command-control/cobalt-strike/#customer-id

https://swisskyrepo.github.io/InternalAllTheThings/command-control/cobalt-strike/#elevate-kit

https://swisskyrepo.github.io/InternalAllTheThings/command-control/metasploit/#scripting-metasploit

https://github.com/mandiant/SharPersist/wiki

https://malwaretech.com/2024/02/bypassing-edrs-with-edr-preload.html

https://adsecurity.org/?p=3458

https://learn.microsoft.com/en-gb/archive/blogs/pie/credential-theft-made-easy-with-kerberos-delegation

Event tracing for windows bypass

AMSI Bypass

https://linux.die.net/man/1/msktutil

https://www.youtube.com/channel/UCJU2r634VNPeCRug7Y7qdcw

https://github.com/nettitude/Aladdin?tab=readme-ov-file

https://mayfly277.github.io/posts/GOADv2/

https://maldevacademy.com/syllabus

https://www.netexec.wiki/

https://www.inetsim.org/features.html

https://pentestlab.blog/2022/03/21/unconstrained-delegation/

https://www.securityandit.com/network/kerberos-protocol-understanding/

https://www.tarlogic.com/blog/kerberos-iii-how-does-delegation-work/

https://www.hub.trimarcsecurity.com/post/leveraging-the-kerberos-bronze-bit-attack-cve-2020-17049-scenarios-to-compromise-active-directory

https://blog.improsec.com/tech-blog/the-mind-blowing-kerberos-use-any-authentication-protocol-delegation

https://learn.microsoft.com/en-us/windows-server/security/group-managed-service-accounts/configure-kerberos-delegation-group-managed-service-accounts

https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/configuring_and_managing_identity_management/assembly_using-constrained-delegation-in-idm_configuring-and-managing-idm#doc-wrapper