0xPThree.gitbook.io
CtrlK
  • Network Services
    • Ports
  • Active Directory
    • ADCS
    • DACL Abuse
    • Security groups
    • Misc
  • Coding Languages
    • Python
  • Exploits / PoC's
    • Ansible
    • Apache
    • ASP.NET
    • Confluence - CVE-2023-22527
    • CUPS - CVE-2024-47***
    • D-Link
    • Dmidecode - CVE-2023-30630
    • Erlang
    • EternalBlue - MS17-010
    • Gitlab - CVE-2023-7028
    • Golang
    • Ivanti - CVE-2024-21893 / 21887
    • Jenkins - CVE-2024-23897
    • LXD group - N/A
    • nf_tables - CVE-2024-1086
    • NFS - N/A
    • Node
    • Oracle
    • PHP
    • RunC
    • Snap - CVE-2019-7304
    • Sudo
    • TP-Link - CVE-2024-5035
    • VMware
  • Hardware
    • Firmware
    • JTAG
    • SPI
    • UART
    • USB
  • Post Exploit
    • Compile payload
    • Obfuscation
    • Read VMDK files
    • Saved Credentials
    • Session Hijack
    • Sniffing Passwords
    • Upgrade shell
    • VMware
      • Disk Encryption
      • LDAP Connection (SSO)
      • Restore VCSA Postgres Database
      • vCenter Forge SAML
      • Waiter Account Information
  • SQL Injection
    • MSSQL
  • Development
    • Dnsmasq DHCP
    • Docker
    • Harden Windows Host
    • HTTPS Proxy
    • Netplan + Networkd
    • SSL/TLS Certificates
  • TODO
Powered by GitBook
On this page

Was this helpful?

  1. Post Exploit

VMware

Disk EncryptionLDAP Connection (SSO)Restore VCSA Postgres DatabasevCenter Forge SAMLWaiter Account Information

Was this helpful?