Microsoft office crypto info
Using Docrecrypt
Different type of office version
http://www.techrepublic.com/article/how-netbios-name-resolution-really-works/
Method execution, OS, Process, Data
Active Directory Security
Window log event ID reference
Windows
Certificate creation
-
Creating self signed certificates with makecert.exe for development - Jayway
blog.jayway.com
-
Makecert.exe (Certificate Creation Tool)
msdn.microsoft.com
Certificate creationMicrosoft Office
-
Plan cryptography and encryption settings for Office 2013
technet.microsoft.com
-
Office build numbers | Build Numbers
buildnumbers.wordpress.com
-
Office Crypto – David LeBlanc's Web Log
blogs.msdn.microsoft.com
-
Remove or reset file passwords in Office 2013
technet.microsoft.com
-
c# - How to detect installed version of MS-Office? - Stack Overflow
stackoverflow.com
Microsoft OfficeMicrosoft office crypto info
Using Docrecrypt
Different type of office version
WinRM
-
Understanding and troubleshooting WinRM connection and authentication: a thrill seeker'...
hurryupandwait.io
WinRMPS-Remoting
-
PowerShell – How to create a PSCredential object – Kotesh Bandhamravuri
blogs.msdn.microsoft.com
PS-RemotingLateral movement
-
Authenticated Remote Code Execution Methods in Windows « Thoughts on Security
scriptjunkie.us
-
Remote Weaponization of WSUS MITM – @sixdub
sixdub.net
-
GitHub - Kevin-Robertson/Invoke-TheHash: PowerShell Pass The Hash Utils
github.com
-
Ways to Download and Execute code via the Commandline | GreyHatHacker.NET
greyhathacker.net
Lateral movementSMB
-
Wireshark: Determining a SMB and NTLM version in a Windows environment | Knowledge for ...
richardkok.wordpress.com
-
SMB Troubleshooting | KeithsOffice
keithsoffice.wordpress.com
SMBNetBios
-
How NetBIOS name resolution really works
evernote.com
NetBioshttp://www.techrepublic.com/article/how-netbios-name-resolution-really-works/
Patch Identification
-
GitHub - GDSSecurity/Windows-Exploit-Suggester: This tool compares a targets patch leve...
github.com
Patch Identification.Net RSA Encryption
-
CSharp-easy-RSA-PEM/main.cs at master · jrnker/CSharp-easy-RSA-PEM · GitHub
github.com
-
Cryptographic Interoperability: Keys - CodeProject
codeproject.com
-
RSACryptoServiceProvider fails when used with ASP.NET – Decrypt my World
blogs.msdn.microsoft.com
-
RSACryptoServiceProvider CryptographicException System Cannot Find the File Specified u...
stackoverflow.com
-
Reading, writing and converting RSA keys in PEM, DER, PUBLICKEYBLOB and PRIVATEKEYBLOB ...
pumka.net
-
.NET RSACryptoServiceProvider PEM + DER Support - Ady Lee - 博客园
cnblogs.com
-
1 more
.Net RSA EncryptionPowershell
-
Rijndael Encryption and Decryption in C# and Powershell |
evernote.com
-
Useful powershell commands
evernote.com
-
PowerShell Remoting Cheatsheet
evernote.com
-
Mad With PowerShell: 64-bit vs 32-bit PowerShell
madwithpowershell.com
-
GitHub - danielbohannon/Invoke-Obfuscation: PowerShell Obfuscator
github.com
-
Characters to Escape
rlmueller.net
-
2 more
PowershellBatch command
-
Batch files and batch commands
robvanderwoude.com
Batch commandWMI Persistency
-
Creating WMI Permanent Event Subscriptions Using MOF - CodeProject
codeproject.com
-
us-15-Graeber-Abusing-Windows-Management-Instrumentation-WMI-To-Build-A-Persistent Asyn...
blackhat.com
-
WMI_for_Detection_and_Response_S508C.pdf
ics-cert.us-cert.gov
-
WINDOWS MANAGEMENT INSTRUMENTATION (WMI) OFFENSE, DEFENSE, AND FORENSICS
fireeye.com
-
Use PowerShell to Monitor and Respond to Events on Your Server | Hey, Scripting Guy! Blog
blogs.technet.microsoft.com
WMI PersistencySQLCMD
-
SQLServer Architecture,Benchmarking&Performance Optimization,DisasterRecovery,HighAvail...
sqlserverspecialists.com
SQLCMDWMIC
-
WMIC Commands
TXT
WMICMethod execution, OS, Process, Data
NTLM
-
NTLM Mechanism in detail
evernote.com
-
(2006-12-28) NTLM And Kerberos Authentication Explained The Easy Way « Jorge's Quest Fo...
jorgequestforknowledge.wordpress.com
-
SANS Digital Forensics and Incident Response Blog | Protecting Privileged Domain Accoun...
digital-forensics.sans.org
NTLMMemory Forensic
-
Memory Forensics
resources.infosecinstitute.com
-
Detecting Lateral Movement through Tracking Event Logs
evernote.com
Memory ForensicWindows
-
Detecting Forged Kerberos Ticket (Golden Ticket & Silver Ticket) Use in Active Director...
adsecurity.org
-
Security Watch: The Most Misunderstood Windows Security Setting of All Time
technet.microsoft.com
WindowsActive Directory Security
Event logs
-
WEVTUTIL | Windows CMD | SS64.com
ss64.com
-
Event-o-Pedia EventID 680 - Logon attempt by: %1 [Win 2003 / XP]
eventopedia.cloudapp.net
-
Windows Security Log Encyclopedia
ultimatewindowssecurity.com
Event logsWindow log event ID reference
Exchange server
-
Cmdlet List: Exchange 2007 Help
technet.microsoft.com
-
Get-ClientAccessServer
technet.microsoft.com
-
Understand the Exchange Server Roles in Exchange Server 2010
technet.microsoft.com
-
What ports does MS Exchange use? - Support Area
support.prolateral.com
-
Exchange Management Shell Quick Reference
exchangepedia.com
-
How to Search Message Tracking Logs: Exchange 2007 Help
technet.microsoft.com
-
4 more
Exchange serverKerberos
-
How the Kerberos Version 5 Authentication Protocol Works: Logon and Authentication
technet.microsoft.com
-
Kerberos in Active Directory | Security content from Windows IT Pro
windowsitpro.com
KerberosSysinternals
-
SysInternals Pro: Using Process Explorer to Troubleshoot and Diagnose
howtogeek.com
-
SysInternals Pro: Using Autoruns to Deal with Startup Processes and Malware
howtogeek.com
-
hta-t07r-license-to-kill-malware-hunting-with-the-sysinternals-tools_final.pdf
rsaconference.com
SysinternalsNTDS.dit
-
Getting Hashes From NTDS.dit File - Sword & Shield
swordshield.com
NTDS.ditIIS Control
-
Appcmd.exe
iis.net
-
Application Pool Identities : The Official Microsoft IIS Site
iis.net
IIS Control