Abusing DCOM For Yet Another Lateral Movement Technique
In Summary : This post discusses an alternate DCOM lateral movement discovery and payload execution method. The primary gist is to locate...
https://updatesinfosec.blogspot.com/2018/05/abusing-dcom-for-yet-another-lateral.html
In Summary :
This post discusses an alternate DCOM lateral movement discovery and payload execution method. The primary gist is to locate DCOM registry key/values that point to the path of a binary on the ‘remote’ machine that does not exist. This example method is likely to work if[...]
kindly refer the following link as follow up :
https://bohops.com/2018/04/28/abusing-dcom-for-yet-another-lateral-movement-technique/
This post discusses an alternate DCOM lateral movement discovery and payload execution method. The primary gist is to locate DCOM registry key/values that point to the path of a binary on the ‘remote’ machine that does not exist. This example method is likely to work if[...]
kindly refer the following link as follow up :
https://bohops.com/2018/04/28/abusing-dcom-for-yet-another-lateral-movement-technique/