Рет қаралды 1,483
This is part 6 of the Shinra series. We are passing the cache to get a winrm sesssion on client03. We then encounter WDAC and find a way around it to get a beacon. Finally, we look into a Visual Studio Code vulnerability to move to client04.
[ Support & Private Lab Access ]
• vulnlab.com
[ Discord ]
• / discord
[ Timestamps ]
00:00 Intro
00:20 Pass-the-Cache
04:15 Beacon up
06:09 WDAC says Hello
10:00 WDAC says Bye
13:17 Enumeration & Jupyter Notebooks
22:35 LFI
[ Notes & Links ]
• vulndev.io/
[ Desktop ]
• github.com/xct/kali-clean
• www.yuumeiart.com/
[ About ]
• vulndev.io
• / xct_de
• github.com/xct
This is purely educational content - all practical work is done in environments that allow and encourage offensive security training.