SANS Penetration Testing: Tag - post-exploitation

Pen Test Privilege Escalation Through Suspended Virtual Machines

[Editor's Note: Mark Baggett has a really clever and useful set of penetration testing tips in this blog entry on post-exploitation techniques to plunder suspended guest virtual machines for credentials. It's a nifty idea, eminently useful in an ethical hacking project, and Mark highlights exactly the tools, steps, and commands needed. Nice stuff, Mark! -Ed.] … Continue reading Pen Test Privilege Escalation Through Suspended Virtual Machines


Presentation: PowerShell for Pen Testers

[Editor's Note: Tim "My Shell Makes Your Shell Cry Like a Little Baby" Medin did a presentation at SANS Orlando called "PowerShell for Pen Testers". It's really good. It starts out with an overview of PowerShell for the uninitiated, and then quickly jumps to some really effective use cases of PowerShell for penetration testers and … Continue reading Presentation: PowerShell for Pen Testers