Cub3sec's Offensive Handbook
Ctrlk
  • πŸ–₯️Cub3sec's Offensive Handbook
  • πŸ”Enumeration
    • πŸ“΄Passive
    • πŸ“³Active
    • πŸ•ΈοΈWeb Application
  • πŸ“₯Initial Access
    • πŸ•ΈοΈCommon Web Application Attacks
    • πŸ’‰SQL Injection Attacks
    • 🧍Client-Side Attacks
    • πŸ”‘Password Attacks
    • 🐚Shells
  • βš”οΈPrivilege Escalation
    • 🐧Linux
    • πŸͺŸWindows
      • Situational Awareness
      • Windows Services
        • Service Binary Hijacking
        • Service DLL Hijacking
        • Unquoted Service Paths
        • Local Services
      • Scheduled Tasks
      • Kernel Exploits
  • 🏍️Lateral Movement
    • 🐧Linux
    • πŸͺŸWindows
  • πŸ–οΈReporting
    • πŸ–ŠοΈReport writing
  • πŸš”AV Evasion
    • πŸ’ŠAV Detection
    • πŸ’‰Process Memory Injection
    • Defender Bypass
  • πŸ“‚Active Directory
    • πŸ”Enumeration
    • Attacking Authentication
    • Shadow Credentials
    • Targeted Kerberoasting
Powered by GitBook
On this page
  1. βš”οΈPrivilege Escalation
  2. πŸͺŸWindows

Windows Services


  • Service Binary Hijacking

  • Service DLL Hijacking

  • Unquoted Service Paths


PreviousSituational AwarenessNextService Binary Hijacking

Last updated 1 year ago