Vulnlab | Shinra: Pass-the-Cache, WDAC & Visual Studio Code

  Рет қаралды 1,483

vulnlab

vulnlab

Күн бұрын

This is part 6 of the Shinra series. We are passing the cache to get a winrm sesssion on client03. We then encounter WDAC and find a way around it to get a beacon. Finally, we look into a Visual Studio Code vulnerability to move to client04.
[ Support & Private Lab Access ]
• vulnlab.com
[ Discord ]
• / discord
[ Timestamps ]
00:00 Intro
00:20 Pass-the-Cache
04:15 Beacon up
06:09 WDAC says Hello
10:00 WDAC says Bye
13:17 Enumeration & Jupyter Notebooks
22:35 LFI
[ Notes & Links ]
• vulndev.io/
[ Desktop ]
• github.com/xct/kali-clean
• www.yuumeiart.com/
[ About ]
• vulndev.io
• / xct_de
• github.com/xct
This is purely educational content - all practical work is done in environments that allow and encourage offensive security training.

Пікірлер: 2
@0xrobinho0d41
@0xrobinho0d41 Жыл бұрын
Amazing as usual
@discobored
@discobored Жыл бұрын
Thanks for the content !
Miracle Doctor Saves Blind Girl ❤️
00:59
Alan Chikin Chow
Рет қаралды 48 МЛН
Create a Jupyter Notebook in VS Code!
0:16
Visual Studio Code
Рет қаралды 76 М.
Fastfetch, alternative to Neofetch on Linux
5:58
Friendly Alien
Рет қаралды 1,1 М.
Vulnlab | Wutai: Reverse Engineering & Lateral Movement
15:03
Get started with Jupyter Notebooks in less than 4 minutes
3:48
Visual Studio Code
Рет қаралды 417 М.
Vulnlab | Lock - Gitea Access Tokens, mRemoteNG & PDF24
14:36
Vulnlab | Wutai: Browser Credentials & Playing with Bitwarden
16:11