Posts

Showing posts with the label evasion

Mastering Child-to-Parent Trust Exploitation with Rubeus

While Mimikatz has long been the undisputed king of Kerberos attacks, a new contender has emerged from the shadows to claim its place in the red teamer's arsenal: Rubeus . This C# powerhouse from the GhostPack suite represents the evolution of Kerberos exploitation, offering enhanced operational security, memory-only execution, and a level of sophistication that makes traditional tools look antiquated. In the world of Active Directory exploitation, where stealth and precision matter as much as raw capability, Rubeus has become the weapon of choice for sophisticated adversaries targeting parent-child domain trust relationships. If you've mastered the classic Mimikatz approach to trust exploitation, it's time to upgrade your toolkit and discover why modern red teams are making the switch to Rubeus. Rubeus is a C# toolset for raw Kerberos interaction and abuses. It is heavily adapted from Benjamin Delpy's Kekeo project and Vincent LE TOUX's MakeMeEnterpriseAdmin p...

Mastering PowerShell Execution Policy Bypass

📋 Table of Contents 1. Introduction to PowerShell Execution Policies 2. Understanding Execution Policy Mechanisms 3. Basic Bypass Techniques 4. Advanced Bypass Methods 5. PowerShell Script Signing 6. Converting PowerShell to Executables 7. Advanced Obfuscation Techniques 8. Steganographic Delivery Systems 9. Bypassing Reputation-Based Protection 10. Practical Implementation Scenarios 11. Detection Evasion Strategies 12. Conclusion and Best Practices 🔒 Introduction to PowerShell Execution Policies This guide is used in professional penetration testing training and aligns with MITR...