<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://pentestlab.blog/methodologies/red-teaming/credential-access/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/08/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/08/credentials-passwords.png</image:loc><image:title>credentials-passwords</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/08/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-08-28T08:33:07+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://pentestlab.blog/2024/08/20/web-browser-stored-credentials/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/08/web-browser-stored-credentials-donpapi.png</image:loc><image:title>Web Browser Stored Credentials - donpapi</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/08/dpapi-linux.jpg</image:loc><image:title>DPAPI - Linux</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/08/web-browser-stored-credentials-dploot-master-key.png</image:loc><image:title>Web Browser Stored Credentials - dploot Master Key</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/08/web-browser-stored-credentials-dploot.png</image:loc><image:title>Web Browser Stored Credentials - dploot</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/08/web-browser-stored-credentials-lsassy-master-keys.png</image:loc><image:title>Web Browser Stored Credentials - lsassy Master Keys</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/08/web-browser-stored-credentials-dpapi-domain-backup-key-file.png</image:loc><image:title>Web Browser Stored Credentials - DPAPI Domain Backup Key File</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/08/web-browser-stored-credentials-dpapi-domain-backup-key.png</image:loc><image:title>Web Browser Stored Credentials - DPAPI Domain Backup Key</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/08/web-browser-stored-credentials-decrypt-master-key-mimikatz.png</image:loc><image:title>Web Browser Stored Credentials - Decrypt Master Key Mimikatz</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/08/web-browser-stored-credentials-domain-backup-key-mimikatz.png</image:loc><image:title>Web Browser Stored Credentials - Domain Backup Key Mimikatz</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/08/web-browser-stored-credentials-dpapi-backupkey.png</image:loc><image:title>Web Browser Stored Credentials - DPAPI BackupKey</image:title></image:image><lastmod>2024-08-19T21:06:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/methodologies/red-teaming/persistence/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/03/persistence-techniques.webp</image:loc><image:title>Persistence Techniques</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/19.png</image:loc><image:title>WEAKERTH4N</image:title><image:caption>WEAKERTH4N Menu</image:caption></image:image><lastmod>2024-04-04T19:38:45+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://pentestlab.blog/2024/04/03/persistence-dll-proxy-loading/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/04/dll-proxying-loading-process-thread.png</image:loc><image:title>dll-proxying-loading-process-thread</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/04/dll-proxying-loading-implant.png</image:loc><image:title>dll-proxying-loading-implant</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/04/dll-proxying-loading-c2.png</image:loc><image:title>dll-proxying-loading-c2</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/04/dll-proxying-loading-fzsftp.png</image:loc><image:title>dll-proxying-loading-fzsftp</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/04/dll-proxying-loading-sharpdllproxy-dll-proxy.png</image:loc><image:title>dll-proxying-loading-sharpdllproxy-dll-proxy</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/04/dll-proxying-loading-sharpdllproxy.png</image:loc><image:title>dll-proxying-loading-sharpdllproxy</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/04/dll-proxying-loading-spartacus-dll-hijacking.png</image:loc><image:title>dll-proxying-loading-spartacus-dll-hijacking</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/04/dll-proxying-loading-spartacus.png</image:loc><image:title>dll-proxying-loading-spartacus</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/04/dll-proxying-loading-messagebox-1.png</image:loc><image:title>dll-proxying-loading-messagebox-1</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/04/dll-proxying-loading-dll-export-proxy-dll-dumpbin.png</image:loc><image:title>dll-proxying-loading-dll-export-proxy-dll-dumpbin</image:title></image:image><lastmod>2024-04-02T23:02:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2024/03/05/persistence-explorer/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/03/explorer-host-enumeration.png</image:loc><image:title>explorer-host-enumeration</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/03/explorer-implant.png</image:loc><image:title>explorer-implant</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/03/explorer-cscapi.png</image:loc><image:title>explorer-cscapi</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/03/explorer-dll-hijacking.png</image:loc><image:title>explorer-dll-hijacking</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/03/explorer-python-web-server.png</image:loc><image:title>explorer-python-web-server</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/03/explorer-process-monitor-cscapi.png</image:loc><image:title>explorer-process-monitor-cscapi</image:title></image:image><lastmod>2024-10-08T17:19:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2024/03/04/persistence-visual-studio-code-extensions/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/02/visual-studio-code-extensions-javascript-messagebox.png</image:loc><image:title>visual-studio-code-extensions-javascript-messagebox</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/02/visual-studio-code-extensions-electron-javascript.png</image:loc><image:title>visual-studio-code-extensions-electron-javascript</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/02/visual-studio-code-extensions-javascript.png</image:loc><image:title>visual-studio-code-extensions-javascript</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/02/visual-studio-code-extensions-meterpreter-working-directory.png</image:loc><image:title>visual-studio-code-extensions-meterpreter-working-directory</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/02/visual-studio-code-extensions-meterpreter.png</image:loc><image:title>visual-studio-code-extensions-meterpreter</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/02/visual-studio-code-extensions-powershell-payload.png</image:loc><image:title>visual-studio-code-extensions-powershell-payload</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/02/visual-studio-code-extensions-process.png</image:loc><image:title>visual-studio-code-extensions-process</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/02/visual-studio-code-extensions-extension.png</image:loc><image:title>visual-studio-code-extensions-extension</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/02/visual-studio-code-extensions-c2.png</image:loc><image:title>visual-studio-code-extensions-c2</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/02/visual-studio-code-extensions-visual-studio-code.png</image:loc><image:title>visual-studio-code-extensions-visual-studio-code</image:title></image:image><lastmod>2024-03-02T13:32:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2024/02/20/as-rep-roasting/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/01/as-rep-roasting-winrm.png</image:loc><image:title>as-rep-roasting-winrm</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/01/as-rep-roasting-crackmapexec.png</image:loc><image:title>as-rep-roasting-crackmapexec</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/01/as-rep-roasting-crackmapexec-unauthenticated.png</image:loc><image:title>as-rep-roasting-crackmapexec-unauthenticated</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/01/as-rep-roasting-impacket-john.png</image:loc><image:title>as-rep-roasting-impacket-john</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/01/as-rep-roasting-impacket.png</image:loc><image:title>as-rep-roasting-impacket</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/01/as-rep-roasting-impacket-unauthenticated.png</image:loc><image:title>as-rep-roasting-impacket-unauthenticated</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/01/as-rep-roasting-rubeus.png</image:loc><image:title>as-rep-roasting-rubeus</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/01/as-rep-roasting-rubeus-c2.png</image:loc><image:title>as-rep-roasting-rubeus-c2</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/01/as-rep-roasting-john.png</image:loc><image:title>as-rep-roasting-john</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/01/as-rep-roasting-hash.png</image:loc><image:title>as-rep-roasting-hash</image:title></image:image><lastmod>2024-02-19T20:29:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2024/02/05/persistence-windows-setup-script/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/01/windows-setup-script-process-tree.png</image:loc><image:title>windows-setup-script-process-tree</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/01/windows-setup-script-c2.png</image:loc><image:title>windows-setup-script-c2</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/01/windows-setup-script-messagebox.png</image:loc><image:title>windows-setup-script-messagebox</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/01/windows-setup-script-folder.png</image:loc><image:title>windows-setup-script-folder</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/01/windows-setup-script-message-box-code.png</image:loc><image:title>windows-setup-script-message-box-code</image:title></image:image><lastmod>2024-01-26T17:57:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2024/01/29/persistence-disk-clean-up/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/01/persistence-disk-clean-up-cleanup-dll.png</image:loc><image:title>persistence-disk-clean-up-cleanup-dll</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/01/persistence-disk-clean-up-messagebox.png</image:loc><image:title>persistence-disk-clean-up-messagebox</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/01/persistence-disk-clean-up-metasploit.png</image:loc><image:title>persistence-disk-clean-up-metasploit</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/01/persistence-disk-clean-up-msfvenom-dll.png</image:loc><image:title>persistence-disk-clean-up-msfvenom-dll</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/01/persistence-disk-clean-up-msfvenom.png</image:loc><image:title>persistence-disk-clean-up-msfvenom</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/01/persistence-disk-clean-up-visual-studio-messagebox.png</image:loc><image:title>persistence-disk-clean-up-visual-studio-messagebox</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/01/persistence-disk-clean-up-registry-query-clsid.png</image:loc><image:title>persistence-disk-clean-up-registry-query-clsid</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/01/persistence-disk-clean-up-clsid-downloaded-program-files.png</image:loc><image:title>persistence-disk-clean-up-clsid-downloaded-program-files</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/01/persistence-disk-clean-up-volumecaches.png</image:loc><image:title>persistence-disk-clean-up-volumecaches</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/01/persistence-disk-clean-up.png</image:loc><image:title>persistence-disk-clean-up</image:title></image:image><lastmod>2024-01-23T17:04:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2024/01/22/domain-escalation-backup-operator/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/01/backup-operator-whoami.png</image:loc><image:title>backup-operator-whoami</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/01/backup-operator-list-files-dc.png</image:loc><image:title>backup-operator-list-files-dc</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/01/backup-operator-regsave.png</image:loc><image:title>backup-operator-regsave</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/01/backup-operator-regsave-access-control-list.png</image:loc><image:title>backup-operator-regsave-access-control-list</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/01/backup-operator-crackmapexec.png</image:loc><image:title>backup-operator-crackmapexec</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/01/backup-operator-secretsdump.png</image:loc><image:title>backup-operator-secretsdump</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/01/backup-operator-non-domain-joined.png</image:loc><image:title>backup-operator-non-domain-joined</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/01/backup-operator-dump-sam.png</image:loc><image:title>backup-operator-dump-sam</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/01/backup-operator-backupoperatortoolkit.png</image:loc><image:title>backup-operator-backupoperatortoolkit</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2024/01/backupoperator-identify-backup-privilege-groups.png</image:loc><image:title>backupoperator-identify-backup-privilege-groups</image:title></image:image><lastmod>2024-02-05T07:09:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2024/01/15/lateral-movement-visual-studio-dte/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/12/visual-studio-dte-lsass-dumping.png</image:loc><image:title>visual-studio-dte-lsass-dumping</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/12/visual-studio-dte-implant.png</image:loc><image:title>visual-studio-dte-implant</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/12/visual-studio-dte-implant-execution.png</image:loc><image:title>visual-studio-dte-implant-execution</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/12/visual-studio-dte-command-execution.png</image:loc><image:title>visual-studio-dte-command-execution</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/12/visual-studio-dte-enumerate-processes.png</image:loc><image:title>visual-studio-dte-enumerate-processes</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/12/visual-studio-dte-registry-clsid.png</image:loc><image:title>visual-studio-dte-registry-clsid</image:title></image:image><lastmod>2023-12-31T21:14:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2024/01/08/persistence-event-log/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/12/event-log-havoc-c2.png</image:loc><image:title>event-log-havoc-c2</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/12/event-log-shellcode.png</image:loc><image:title>event-log-shellcode</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/12/event-log-havoc-sharpeventpersist.png</image:loc><image:title>event-log-havoc-sharpeventpersist</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/12/event-log-havoc-bin-shellcode.png</image:loc><image:title>event-log-havoc-bin-shellcode</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/12/event-log-read-log-entry.png</image:loc><image:title>event-log-read-log-entry</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/12/event-log-write-log-entry.png</image:loc><image:title>event-log-write-log-entry</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/04/persistence-event-log-hexadecimal-becon.png</image:loc><image:title>persistence-event-log-hexadecimal-becon</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/04/persistence-event-log-meterpreter-powershell.png</image:loc><image:title>persistence-event-log-meterpreter-powershell</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/04/persistence-event-log-powershell.png</image:loc><image:title>persistence-event-log-powershell</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/04/persistence-event-log-hexadecimal-payload-msfvenom.png</image:loc><image:title>persistence-event-log-hexadecimal-payload-msfvenom</image:title></image:image><lastmod>2023-12-31T18:58:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2024/01/02/initial-access-search-ms-uri-handler/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/12/search-uri-handler-excel-handler.png</image:loc><image:title>search-uri-handler-excel-handler</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/12/search-uri-handler-excel-via-webdav.png</image:loc><image:title>search-uri-handler-excel-via-webdav</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/12/search-uri-handler-excel.png</image:loc><image:title>search-uri-handler-excel</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/12/search-uri-handler-implant.png</image:loc><image:title>search-uri-handler-implant</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/12/search-uri-handler-motw.png</image:loc><image:title>search-uri-handler-motw</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/12/search-uri-handler-executable.png</image:loc><image:title>search-uri-handler-executable</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/12/search-uri-handler-webclient-service.png</image:loc><image:title>search-uri-handler-webclient-service</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/12/search-uri-handler-implant-whoami.png</image:loc><image:title>search-uri-handler-implant-whoami</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/12/search-uri-handler-implant-via-visual-studio-solution.png</image:loc><image:title>search-uri-handler-implant-via-visual-studio-solution</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/12/search-uri-handler-visual-studio.png</image:loc><image:title>search-uri-handler-visual-studio</image:title></image:image><lastmod>2023-12-29T23:12:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2023/11/20/persistence-scheduled-task-tampering/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/11/6574c40a-00fa-460c-96c3-fda7e6b890c2.jpg</image:loc><image:title>_6574c40a-00fa-460c-96c3-fda7e6b890c2</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/11/scheduled-task-tampering-havoc-c2.png</image:loc><image:title>scheduled-task-tampering-havoc-c2</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/11/scheduled-task-tampering-havoc-c2-scheduled-task-enumeration.png</image:loc><image:title>scheduled-task-tampering-havoc-c2-scheduled-task-enumeration</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/11/scheduled-task-tampering-havoc-c2-scheduled-task-query.png</image:loc><image:title>scheduled-task-tampering-havoc-c2-scheduled-task-query</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/11/scheduled-task-tampering-scheduled-task-modification.png</image:loc><image:title>scheduled-task-tampering-scheduled-task-modification</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/11/scheduled-task-tampering-ghosttask-task-modification.png</image:loc><image:title>scheduled-task-tampering-ghosttask-task-modification</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/11/scheduled-task-tampering-action-registry-key.png</image:loc><image:title>scheduled-task-tampering-action-registry-key</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/11/scheduled-task-tampering-pentestlab-task-information.png</image:loc><image:title>scheduled-task-tampering-pentestlab-task-information</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/11/scheduled-task-tampering-pentestlab-task.png</image:loc><image:title>scheduled-task-tampering-pentestlab-task</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/11/scheduled-task-tampering-ghosttask-create-new-task-output.png</image:loc><image:title>scheduled-task-tampering-ghosttask-create-new-task-output</image:title></image:image><lastmod>2023-11-19T17:51:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2023/11/06/persistence-windows-telemetry/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/10/windows-telemetry-persistence-havoc-c2-implant.png</image:loc><image:title>windows-telemetry-persistence-havoc-c2-implant</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/10/windows-telemetry-persistence-havoc-c2-whoami.png</image:loc><image:title>windows-telemetry-persistence-havoc-c2-whoami</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/10/windows-telemetry-persistence-havoc-c2-sessions.png</image:loc><image:title>windows-telemetry-persistence-havoc-c2-sessions</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/10/windows-telemetry-persistence-implant.png</image:loc><image:title>windows-telemetry-persistence-implant</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/10/windows-telemetry-persistence-registry-telemetry.png</image:loc><image:title>windows-telemetry-persistence-registry-telemetry</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/10/windows-telemetry-persistence-havoc-c2-telemetry-install-remote.png</image:loc><image:title>windows-telemetry-persistence-havoc-c2-telemetry-install-remote</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/10/windows-telemetry-persistence-havoc-c2-telemetry-install-local.png</image:loc><image:title>windows-telemetry-persistence-havoc-c2-telemetry-install-local</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/10/windows-telemetry-persistence-havoc-graph-view.png</image:loc><image:title>windows-telemetry-persistence-havoc-graph-view</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/10/windows-telemetry-persistence-registry.png</image:loc><image:title>windows-telemetry-persistence-registry</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/10/windows-telemetry-persistence-command-prompt.png</image:loc><image:title>windows-telemetry-persistence-command-prompt</image:title></image:image><lastmod>2023-11-01T22:28:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2023/03/20/persistence-service-control-manager/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/03/persistence-sddl-meterpreter.png</image:loc><image:title>persistence-sddl-meterpreter</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/03/persistence-sddl-services.png</image:loc><image:title>persistence-sddl-services</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/03/persistence-sddl-service-creation.png</image:loc><image:title>persistence-sddl-service-creation</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/03/persistence-sddl-security-descriptor-permission-modification.png</image:loc><image:title>persistence-sddl-security-descriptor-permission-modification</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/03/persistence-sddl-scmanager-show-rights.png</image:loc><image:title>persistence-sddl-scmanager-show-rights</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/03/persistence-sddl-enumerate-permissions-powershell.png</image:loc><image:title>persistence-sddl-enumerate-permissions-powershell</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/03/persistence-sddl-scmanager-security-descriptor.png</image:loc><image:title>persistence-sddl-scmanager-security-descriptor</image:title></image:image><lastmod>2023-03-20T15:53:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2023/03/13/persistence-context-menu/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/03/persistence-contextmenu-virtualalloc.png</image:loc><image:title>persistence-contextmenu-virtualalloc</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/03/persistence-contextmenu-meterpreter.png</image:loc><image:title>persistence-contextmenu-meterpreter</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/03/persistence-contextmenu-register-dll.png</image:loc><image:title>persistence-contextmenu-register-dll</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/03/persistence-contextmenu-msfvenom.png</image:loc><image:title>persistence-contextmenu-msfvenom</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/03/persistence-contextmenu-filecontextmenu-register-com.png</image:loc><image:title>persistence-contextmenu-filecontextmenu-register-com</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/03/persistence-contextmenu-filecontextmenu-queryinterface.png</image:loc><image:title>persistence-contextmenu-filecontextmenu-queryinterface</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/03/persistence-contextmenu-filecontextmenu-initialize.png</image:loc><image:title>persistence-contextmenu-filecontextmenu-initialize</image:title></image:image><lastmod>2023-03-13T15:19:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2023/03/07/persistence-event-log-online-help/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/03/event-log-online-help-mmc-parent-process.png</image:loc><image:title>event-log-online-help-mmc-parent-process</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/03/event-log-online-help-microsoft-redirection-url.png</image:loc><image:title>event-log-online-help-microsoft-redirection-url</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/03/event-log-online-help-messagebox.png</image:loc><image:title>event-log-online-help-messagebox</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/03/event-log-online-help-meterpreter-regsvr32.png</image:loc><image:title>event-log-online-help-meterpreter-regsvr32</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/03/event-log-online-help-microsoft-redirection-program-command-line-regsvr32.png</image:loc><image:title>event-log-online-help-microsoft-redirection-program-command-line-regsvr32</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/03/event-log-online-help-meterpreter.png</image:loc><image:title>event-log-online-help-meterpreter</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/03/event-log-online-help-microsoft-redirection-program.png</image:loc><image:title>event-log-online-help-microsoft-redirection-program</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2023/03/event-log-online-help-msfvenom.png</image:loc><image:title>event-log-online-help-msfvenom</image:title></image:image><lastmod>2023-03-07T10:45:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2022/03/21/unconstrained-delegation/</loc><lastmod>2022-03-21T16:57:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2022/02/14/persistence-notepad-plugins/</loc><lastmod>2022-02-02T20:00:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2022/02/07/shadow-credentials/</loc><lastmod>2022-01-24T16:30:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2022/01/17/domain-persistence-machine-account/</loc><lastmod>2022-01-17T11:25:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2022/01/10/domain-escalation-samaccountname-spoofing/</loc><lastmod>2022-01-08T08:27:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2022/02/01/machine-accounts/</loc><lastmod>2021-12-29T18:04:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2022/01/04/domain-persistence-adminsdholder/</loc><lastmod>2021-12-27T14:36:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2021/11/15/golden-certificate/</loc><lastmod>2021-11-15T12:12:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2021/10/20/lateral-movement-webclient/</loc><lastmod>2021-10-30T13:16:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2021/10/18/resource-based-constrained-delegation/</loc><lastmod>2022-12-07T09:19:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2021/09/14/petitpotam-ntlm-relay-to-ad-cs/</loc><lastmod>2022-11-23T10:15:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2021/09/13/account-persistence-certificates/</loc><lastmod>2021-11-08T12:12:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2021/08/17/domain-escalation-printnightmare/</loc><lastmod>2021-08-16T15:27:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2021/08/16/hivenightmare/</loc><lastmod>2021-08-20T18:58:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2021/08/02/universal-privilege-escalation-and-persistence-printer/</loc><lastmod>2021-08-03T08:33:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2021/05/24/dumping-rdp-credentials/</loc><lastmod>2022-10-04T08:39:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2021/05/17/persistence-amsi/</loc><lastmod>2021-05-17T07:53:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2021/05/04/remote-potato-from-domain-user-to-enterprise-admin/</loc><lastmod>2021-05-04T13:04:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2021/03/30/plextrac-a-platform-for-purple-teaming/</loc><lastmod>2021-03-30T17:12:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2020/07/21/lateral-movement-services/</loc><lastmod>2020-11-13T07:57:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2020/06/15/spyse-a-cyber-security-search-engine/</loc><lastmod>2020-07-07T21:44:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2020/07/06/indirect-command-execution/</loc><lastmod>2020-07-06T17:52:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/contact-the-lab/</loc><lastmod>2020-07-04T13:14:29+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://pentestlab.blog/2020/05/20/persistence-com-hijacking/</loc><lastmod>2020-05-20T11:50:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2020/03/04/persistence-dll-hijacking/</loc><lastmod>2020-03-04T13:01:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2020/03/02/phishing-windows-credentials/</loc><lastmod>2020-03-01T10:31:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2020/02/24/parent-pid-spoofing/</loc><lastmod>2020-02-23T18:03:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2020/02/12/persistence-rid-hijacking/</loc><lastmod>2020-02-11T20:03:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2020/02/10/credential-access-password-filter-dll/</loc><lastmod>2020-02-09T09:20:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2020/02/04/persistence-waitfor/</loc><lastmod>2020-02-03T21:58:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2020/01/22/persistence-modify-existing-service/</loc><lastmod>2020-01-23T04:47:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2020/01/21/persistence-wmi-event-subscription/</loc><lastmod>2020-01-21T09:47:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/methodologies/red-teaming/</loc><lastmod>2020-01-03T14:29:55+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://pentestlab.blog/methodologies/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/02/backbox-2-menu.png</image:loc><image:title>BackBox 2 </image:title><image:caption>BackBox 2 Menu</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/02/bt5-0.png</image:loc><image:title>Backtrack 5</image:title><image:caption>Backtrack 5 KDE </image:caption></image:image><lastmod>2020-01-03T14:24:21+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://pentestlab.blog/2020/01/14/persistence-winlogon-helper-dll/</loc><lastmod>2020-01-03T14:00:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2020/01/13/persistence-image-file-execution-options-injection/</loc><lastmod>2024-06-20T13:38:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2020/01/07/persistence-appinit-dlls/</loc><lastmod>2020-01-07T22:08:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2020/01/06/persistence-change-default-file-association/</loc><lastmod>2019-12-23T14:42:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2019/12/16/persistence-application-shimming/</loc><lastmod>2019-12-15T20:38:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2019/12/11/persistence-office-application-startup/</loc><lastmod>2019-12-10T18:23:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2019/11/13/persistence-accessibility-features/</loc><lastmod>2019-11-13T13:29:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2019/11/05/persistence-powershell-profile/</loc><lastmod>2019-11-05T13:06:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2019/11/04/persistence-scheduled-tasks/</loc><lastmod>2019-11-06T20:59:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2019/10/30/persistence-bits-jobs/</loc><lastmod>2019-10-28T21:22:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2019/10/29/persistence-netsh-helper-dll/</loc><lastmod>2019-10-27T11:49:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2019/10/28/persistence-port-monitors/</loc><lastmod>2019-10-26T18:29:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2019/10/22/persistence-time-providers/</loc><lastmod>2023-05-14T02:46:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2019/10/21/persistence-security-support-provider/</loc><lastmod>2019-10-21T16:43:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2019/10/09/persistence-screensaver/</loc><lastmod>2019-10-09T12:57:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2019/10/01/persistence-registry-run-keys/</loc><lastmod>2019-10-08T21:48:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2019/10/07/persistence-new-service/</loc><lastmod>2019-10-08T21:47:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2019/10/08/persistence-shortcut-modification/</loc><lastmod>2021-12-30T18:10:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2019/09/16/microsoft-exchange-privilege-escalation/</loc><lastmod>2019-10-03T12:38:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2019/09/12/microsoft-exchange-acl/</loc><lastmod>2019-09-12T09:10:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2019/09/11/microsoft-exchange-mailbox-post-compromise/</loc><lastmod>2019-09-10T19:02:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2019/09/10/microsoft-exchange-code-execution/</loc><lastmod>2019-09-09T20:21:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2019/09/09/microsoft-exchange-ntlm-relay/</loc><lastmod>2019-10-10T02:47:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/contact-the-lab/about-us/</loc><lastmod>2020-12-27T14:42:10+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://pentestlab.blog/2019/09/05/microsoft-exchange-password-spraying/</loc><lastmod>2019-09-05T12:51:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2019/09/04/microsoft-exchange-domain-escalation/</loc><lastmod>2019-09-04T10:43:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2018/07/04/dumping-domain-password-hashes/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/07/wmi-transfer-files-via-copy.png</image:loc><image:title>WMI - Transfer Files via Copy</image:title><image:caption>Transfer Files via Copy</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/07/wmi-copy-system-file.png</image:loc><image:title>WMI - Copy System File</image:title><image:caption>WMI - Copy System File</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/07/wmi-copy-ntds-file.png</image:loc><image:title>WMI - Copy NTDS File</image:title><image:caption>WMI - Copy NTDS File</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/07/wmi-create-volume-shadow-copy.png</image:loc><image:title>WMI - Create Volume Shadow Copy</image:title><image:caption>WMI - Create Volume Shadow Copy</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/07/adxtract-password-hashes.png</image:loc><image:title>adXtract - Password Hashes</image:title><image:caption>adXtract - Password Hashes</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/07/adxtract-list-of-users.png</image:loc><image:title>adXtract - List of Users</image:title><image:caption>adXtract - List of Users</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/07/adxtract.png</image:loc><image:title>adXtract</image:title><image:caption>adXtract</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/07/ntdsdumpex.png</image:loc><image:title>NTDSDumpEx</image:title><image:caption>NTDSDumpEx</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/07/impacket-extract-ntds-contents-remotely.png</image:loc><image:title>impacket - Extract NTDS Contents Remotely</image:title><image:caption>impacket - Extract NTDS Contents Remotely</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/07/impacket-extract-ntds-contents.png</image:loc><image:title>impacket - Extract NTDS Contents</image:title><image:caption>impacket - Extract NTDS Contents</image:caption></image:image><lastmod>2019-05-20T21:57:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2018/06/12/kerberoast/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/06/kerberoast-command-execution.png</image:loc><image:title>Kerberoast - Command Execution</image:title><image:caption>Kerberoast - Command Execution</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/06/kerberoast-list-of-processes.png</image:loc><image:title>Kerberoast - List of Processes</image:title><image:caption>Kerberoast - List of Processes</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/06/mimikatz-request-service-ticket.png</image:loc><image:title>Mimikatz - Request Service Ticket</image:title><image:caption>Mimikatz - Request Service Ticket</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/06/autokerberoast-service-ticket-hash.png</image:loc><image:title>AutoKerberoast - Service Ticket Hash</image:title><image:caption>AutoKerberoast - Service Ticket Hash</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/06/autokerberoast-service-ticket-hashes-of-particular-domain-and-group.png</image:loc><image:title>AutoKerberoast - Service Ticket Hashes of Particular Domain and Group</image:title><image:caption>AutoKerberoast - Service Ticket Hashes of Particular Domain and Group</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/06/autokerberoast-invoke-autokerberoast-base64.png</image:loc><image:title>AutoKerberoast - Invoke-AutoKerberoast Base64</image:title><image:caption>AutoKerberoast - Invoke-AutoKerberoast Base64</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/06/autokerberoast-listuserspns-with-domain-parameter.png</image:loc><image:title>AutoKerberoast - ListUserSPNs with Domain Parameter</image:title><image:caption>AutoKerberoast - ListUserSPNs with Domain Parameter</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/06/kerberoast-rewrite-service-tickets.png</image:loc><image:title>Kerberoast - Rewrite Service Tickets</image:title><image:caption>Kerberoast - Rewrite Service Tickets</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/06/autokerberoast-listuserspns.png</image:loc><image:title>AutoKerberoast - ListUserSPNs</image:title><image:caption>AutoKerberoast - ListUserSPNs</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/06/empire-kerberoast-hash.png</image:loc><image:title>Empire - Kerberoast Hash</image:title><image:caption>Empire - Kerberoast Hash</image:caption></image:image><lastmod>2018-06-12T06:24:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2018/06/06/command-and-control-browser/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/06/browser-c2-jquery-configuration.png</image:loc><image:title>Browser C2 - jquery Configuration</image:title><image:caption>Browser C2 - jquery Configuration</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/06/browser-c2-mimikatz-poshc2.png</image:loc><image:title>Browser C2 - Mimikatz PoshC2</image:title><image:caption>Browser C2 - Mimikatz PoshC2</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/06/browser-c2-mimikatz-via-implant-handler.png</image:loc><image:title>Browser C2 - Mimikatz via Implant Handler</image:title><image:caption>Browser C2 - Mimikatz via Implant Handler</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/06/browser-c2-implant-handler.png</image:loc><image:title>Browser C2 - Implant Handler</image:title><image:caption>Browser C2 - Implant Handler</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/06/browser-c2-code-execution-via-regsvr32-poshc2.png</image:loc><image:title>Browser C2 - Code Execution via regsvr32 PoshC2</image:title><image:caption>Browser C2 - Code Execution via regsvr32 PoshC2</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/06/browser-c2-meterpreter-via-web-delivery.png</image:loc><image:title>Browser C2 - Meterpreter via Web Delivery</image:title><image:caption>Browser C2 - Meterpreter via Web Delivery</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/06/browser-c2-code-execution-via-regsvr32-metasploit.png</image:loc><image:title>Browser C2 - Code Execution via regsvr32 Metasploit</image:title><image:caption>Browser C2 - Code Execution via regsvr32 Metasploit</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/06/browser-c2-metasploit-web-delivery-module.png</image:loc><image:title>Browser C2 - Metasploit Web Delivery Module</image:title><image:caption>Browser C2 - Metasploit Web Delivery Module</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/06/browser-c2-user-enumeration-via-wmic.png</image:loc><image:title>Browser C2 - User Enumeration via WMIC</image:title><image:caption>Browser C2 - User Enumeration via WMIC</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/06/browser-c2-command-execution.png</image:loc><image:title>Browser C2 - Command Execution</image:title><image:caption>Browser C2 - Command Execution</image:caption></image:image><lastmod>2018-06-01T21:40:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2018/06/04/spn-discovery/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/impacket-get-user-spn.png</image:loc><image:title>Impacket - Get User SPN</image:title><image:caption>Impacket - Get User SPN</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/powershellery-get-domainspn.png</image:loc><image:title>PowerShellery - Get-DomainSpn</image:title><image:caption>PowerShellery - Get-DomainSpn</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/powershellery-getspn-table.png</image:loc><image:title>PowerShellery - GetSPN Table</image:title><image:caption>PowerShellery - GetSPN Table</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/powershellery-getspn.png</image:loc><image:title>Powershellery - GetSPN</image:title><image:caption>Powershellery - GetSPN</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/empire-spn-discovery.png</image:loc><image:title>Empire - SPN Discovery</image:title><image:caption>Empire - SPN Discovery</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/empire-spn-module.png</image:loc><image:title>Empire - SPN Module</image:title><image:caption>Empire - SPN Module</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/powershell-ad-recon-service-accounts-via-metasploit.png</image:loc><image:title>PowerShell AD Recon - Service Accounts via Metasploit</image:title><image:caption>PowerShell AD Recon - Service Accounts</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/powershell-ad-recon-exchange-servers-discovery-via-metasploit.png</image:loc><image:title>PowerShell AD Recon - Exchange Servers Discovery via Metasploit</image:title><image:caption>PowerShell AD Recon - Exchange Servers Discovery </image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/powershell-ad-recon-mssql-servers-discovery-via-metasploit.png</image:loc><image:title>PowerShell AD Recon - MSSQL Servers Discovery via Metasploit</image:title><image:caption>PowerShell AD Recon - MSSQL Servers Discovery</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/getuserspns-vbs-script-cmd.png</image:loc><image:title>GetUserSPNs - VBS Script CMD</image:title><image:caption>GetUserSPNs - VBS Script </image:caption></image:image><lastmod>2020-09-21T12:22:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2018/05/28/situational-awareness/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/powerview-obtain-trusts-for-the-forest.png</image:loc><image:title>PowerView - Obtain Trusts for the Forest</image:title><image:caption>PowerView - Forest Information</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/remoterecon-usage.png</image:loc><image:title>RemoteRecon - Usage</image:title><image:caption>RemoteRecon - Usage</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/remoterecon-install.png</image:loc><image:title>RemoteRecon - Install</image:title><image:caption>RemoteRecon - Install</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/hostenum-domain-checks.png</image:loc><image:title>HostEnum - Domain Checks</image:title><image:caption>HostEnum - Domain Checks</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/hostenum-domain-users.png</image:loc><image:title>HostEnum - Domain Users</image:title><image:caption>HostEnum - Domain Users</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/hostenum.png</image:loc><image:title>HostEnum</image:title><image:caption>HostEnum</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/hostrecon-domain-checks.png</image:loc><image:title>HostRecon - Domain Checks</image:title><image:caption>HostRecon - Domain Checks</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/hostrecon-checks-for-security.png</image:loc><image:title>HostRecon - Checks for Security</image:title><image:caption>HostRecon - Checks for Security</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/hostrecon-local-users-and-local-admins.png</image:loc><image:title>HostRecon - Local Users and Local Admins</image:title><image:caption>HostRecon - Local Users and Local Admins</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/hostrecon-execution.png</image:loc><image:title>HostRecon Execution</image:title><image:caption>HostRecon Execution</image:caption></image:image><lastmod>2018-06-17T13:54:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2018/05/15/lateral-movement-winrm/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/winrm-local-group-policy.png</image:loc><image:title>WinRM - Local Group Policy</image:title><image:caption>WinRM - Local Group Policy</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/winrm-enable-the-service.png</image:loc><image:title>WinRM - Enable the Service</image:title><image:caption>WinRM - Enable the Service</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/empire-command-execution-via-winrm.png</image:loc><image:title>Empire - Command Execution via WinRM</image:title><image:caption>Empire - Command Execution via WinRM</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/empire-list-of-agents.png</image:loc><image:title>Empire - List of Agents</image:title><image:caption>Empire - List of Agents</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/empire-psremoting.png</image:loc><image:title>Empire - PSRemoting</image:title><image:caption>Empire - PSRemoting</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/metasploit-winrm-code-execution.png</image:loc><image:title>Metasploit - WinRM Code Execution</image:title><image:caption>Metasploit - WinRM Code Execution</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/metasploit-winrm-code-execution-module-configuration.png</image:loc><image:title>Metasploit - WinRM Code Execution Module Configuration</image:title><image:caption>Metasploit - WinRM Code Execution Module Configuration</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/metasploit-winrm-command-output.png</image:loc><image:title>Metasploit - WinRM Command Output</image:title><image:caption>Metasploit - WinRM Command Output</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/metasploit-winrm-command-execution.png</image:loc><image:title>Metasploit - WinRM Command Execution</image:title><image:caption>Metasploit - WinRM Command Execution</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/metasploit-winrm-discovery-of-credentials.png</image:loc><image:title>Metasploit - WinRM Discovery of Credentials</image:title><image:caption>Metasploit - WinRM Discovery of Credentials</image:caption></image:image><lastmod>2019-04-27T14:12:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2018/05/10/applocker-bypass-cmstp/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/cmstp-inf-and-cmp-file.png</image:loc><image:title>CMSTP - INF and CMP File</image:title><image:caption>CMSTP - INF and CMP File</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/cmstp-meterpreter-via-sct-execution.png</image:loc><image:title>CMSTP - Meterpreter via SCT Execution</image:title><image:caption>CMSTP - Meterpreter via SCT Execution</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/cmstp-inf-execution-with-scriptlet.png</image:loc><image:title>CMSTP - INF Execution with Scriptlet</image:title><image:caption>CMSTP - INF Execution with Scriptlet</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/cmstp-sct-execution.png</image:loc><image:title>CMSTP - SCT Execution</image:title><image:caption>CMSTP - SCT Execution</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/cmstp-metasploit-multi-handler.png</image:loc><image:title>CMSTP - Metasploit Multi Handler</image:title><image:caption>CMSTP - Metasploit Multi Handler</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/cmstp-powershell.png</image:loc><image:title>CMSTP - PowerShell</image:title><image:caption>CMSTP - PowerShell</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/cmstp-meterpreter-via-dll-execution.png</image:loc><image:title>CMSTP - Meterpreter via DLL Execution</image:title><image:caption>CMSTP - Meterpreter via DLL Execution</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/cmstp-inf-execution-locally.png</image:loc><image:title>CMSTP - INF Execution Locally</image:title><image:caption>CMSTP - INF Execution Locally</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/cmstp-local-dll-execution.png</image:loc><image:title>CMSTP - Local DLL Execution</image:title><image:caption>CMSTP - Local DLL Execution</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/metasploit-dll-generation.png</image:loc><image:title>Metasploit - DLL Generation</image:title><image:caption>Metasploit - DLL Generation</image:caption></image:image><lastmod>2019-04-04T22:16:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2018/05/09/pdf-ntlm-hashes/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/pdf-injected-with-smb-location.png</image:loc><image:title>PDF - Injected with SMB Location</image:title><image:caption>PDF - Injected with SMB Location</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/worsepdf.png</image:loc><image:title>WorsePDF</image:title><image:caption>WorsePDF</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/ntlm-hash-via-pdf.png</image:loc><image:title>NTLM Hash via PDF</image:title><image:caption>NTLM Hash via PDF</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/bad-pdf-responder.png</image:loc><image:title>Bad-PDF - Responder</image:title><image:caption>Bad-PDF - Responder</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/bad-pdf.png</image:loc><image:title>Bad-PDF</image:title><image:caption>Bad-PDF</image:caption></image:image><lastmod>2018-05-09T07:49:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2018/05/08/nbns-spoofing/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/nbns-spoofing-hashes-via-metasploit.png</image:loc><image:title>NBNS Spoofing - Hashes via Metasploit</image:title><image:caption>NBNS Spoofing - Hashes via Metasploit</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/metasploit-nbns-response-module.png</image:loc><image:title>Metasploit - NBNS Response Module</image:title><image:caption>Metasploit - NBNS Response Module</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/metasploit-http-server.png</image:loc><image:title>Metasploit - HTTP Server</image:title><image:caption>Metasploit - HTTP Server</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/metasploit-smb-server.png</image:loc><image:title>Metasploit - SMB Server</image:title><image:caption>Metasploit - SMB Server</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/nbns-spoofing-hashes-via-responder.png</image:loc><image:title>NBNS Spoofing - Hashes via Responder</image:title><image:caption>NBNS Spoofing - Hashes via Responder</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/nbns-spoofing-responder.png</image:loc><image:title>NBNS Spoofing - Responder</image:title><image:caption>NBNS Spoofing - Responder</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/nbns-spoofing-hashes-via-inveigh.png</image:loc><image:title>NBNS Spoofing - Hashes via Inveigh</image:title><image:caption>NBNS Spoofing - Hashes via Inveigh</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/05/nbns-spoofing-powershell-inveigh.png</image:loc><image:title>NBNS Spoofing - PowerShell Inveigh</image:title><image:caption>NBNS Spoofing - PowerShell Inveigh</image:caption></image:image><lastmod>2018-05-04T12:01:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2018/04/24/lateral-movement-rdp/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/04/rdp-session-hijacking-via-service-netbiosx-user.png</image:loc><image:title>RDP Session Hijacking via Service - netbiosX User</image:title><image:caption>RDP Session Hijacking via Service - netbiosX User</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/04/rdp-session-hijacking-via-service.png</image:loc><image:title>RDP Session Hijacking via Service</image:title><image:caption>RDP Session Hijacking via Service</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/04/rdp-sessions-terminal.png</image:loc><image:title>RDP Sessions Terminal</image:title><image:caption>RDP Sessions Terminal</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/04/rpd-sessions-gui.png</image:loc><image:title>RPD Sessions Gui</image:title><image:caption>RDP Sessions Gui</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/04/mimikatz-rdp-session-of-netbiosx.png</image:loc><image:title>Mimikatz - RDP Session of netbiosX</image:title><image:caption>Mimikatz - RDP Session of netbiosX</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/04/mimikatz-rdp-session-hijacking.png</image:loc><image:title>Mimikatz - RDP Session Hijacking</image:title><image:caption>Mimikatz - RDP Session Hijacking</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/04/mimikatz-terminal-services-sessions1.png</image:loc><image:title>Mimikatz - Terminal Services Sessions</image:title><image:caption>Mimikatz - Terminal Services Sessions</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/04/rdp-inception-meterpreter-active-sessions.png</image:loc><image:title>RDP Inception - Meterpreter Active Sessions</image:title><image:caption>RDP Inception - Meterpreter Active Sessions</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/04/rdp-inception-meterpreter-on-the-dc.png</image:loc><image:title>RDP Inception - Meterpreter on the DC</image:title><image:caption>RDP Inception - Meterpreter on the DC</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/04/rdp-inception-code-execution-on-the-dc.png</image:loc><image:title>RDP Inception - Code Execution on the DC</image:title><image:caption>RDP Inception - Code Execution on the DC</image:caption></image:image><lastmod>2018-05-22T14:28:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2018/04/16/dcshadow/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/04/dcshadow-escalate-user-to-domain-admin.png</image:loc><image:title>DCShadow - Escalate User to Domain Admin</image:title><image:caption>DCShadow - Verification that test user is DA</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/04/dcshadow-add-user-to-domain-admin-group.png</image:loc><image:title>DCShadow - Add User to Domain Admin Group</image:title><image:caption>DCShadow - Add User to Domain Admin Group</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/04/dcshadow-url-value.png</image:loc><image:title>DCShadow - url value</image:title><image:caption>DCShadow - url Attribute</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/04/dcshadow-push.png</image:loc><image:title>DCShadow - Push</image:title><image:caption>DCShadow - Replicate attributes in the Domain Controller</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/04/mimikatz-dcshadow-on-url-attribute.png</image:loc><image:title>Mimikatz - DCShadow on url Attribute</image:title><image:caption>Mimikatz - DCShadow &amp; URL Attribute </image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/04/mimikatz-retrieve-user-token.png</image:loc><image:title>Mimikatz - Retrieve User Token</image:title><image:caption>Mimikatz - User Token</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/04/mimikatz-register-a-service-and-obtain-system-token.png</image:loc><image:title>Mimikatz - Register a Service and Obtain SYSTEM Token</image:title><image:caption>Mimikatz - Register a Service and obtain SYSTEM token</image:caption></image:image><lastmod>2018-12-29T04:30:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2018/04/10/skeleton-key/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/04/skeleton-key-share.png</image:loc><image:title>Skeleton Key - Share</image:title><image:caption>Skeleton Key - Domain Controller Share Accessible </image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/04/skeleton-key-map-a-dc-share.png</image:loc><image:title>Skeleton Key - Map a DC Share</image:title><image:caption>Skeleton Key - Map a DC Share</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/04/skeleton-key-rds-connection.png</image:loc><image:title>Skeleton Key - RDS Connection</image:title><image:caption>Skeleton Key - RDS Connection</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/04/skeleton-key-remote-desktop.png</image:loc><image:title>Skeleton Key - Remote Desktop</image:title><image:caption>Skeleton Key - Remote Desktop</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/04/empire-skeleton-key-execution.png</image:loc><image:title>Empire - Skeleton Key Execution</image:title><image:caption>Empire - Skeleton Key Execution</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/04/empire-skeleton-key-module.png</image:loc><image:title>Empire - Skeleton Key Module</image:title><image:caption>Empire - Skeleton Key Module</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/04/mimikatz-skeleton-key.png</image:loc><image:title>Mimikatz - Skeleton Key</image:title><image:caption>Mimikatz - Skeleton Key</image:caption></image:image><lastmod>2019-09-06T15:48:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2018/04/09/golden-ticket/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/04/run-a-command-on-the-dc-before-golden-ticket.png</image:loc><image:title>Run a Command on the DC before Golden Ticket</image:title><image:caption>Listing DC Admin Share without Golden Ticket</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/04/domain-users-absence-of-evil-user.png</image:loc><image:title>Domain Users - Absence of evil user</image:title><image:caption>Domain Users - Absence of evil user</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/04/golden-ticket-shell-with-psexec-as-invalid-user.png</image:loc><image:title>Golden Ticket - Shell with PsExec as invalid user</image:title><image:caption>Golden Ticket - Shell with PsExec as invalid user</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/04/golden-ticket-executing-commands-on-the-domain-controller-as-standard-user.png</image:loc><image:title>Golden Ticket - Executing Commands on the Domain Controller as standard user</image:title><image:caption>Golden Ticket - Executing Commands on the Domain Controller as standard user</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/04/mimikatz-kerberos-tickets.png</image:loc><image:title>Mimikatz - Kerberos Tickets</image:title><image:caption>Mimikatz - Kerberos Tickets</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/04/mimikatz-golden-ticket-creation.png</image:loc><image:title>Mimikatz - Golden Ticket Creation</image:title><image:caption>Mimikatz - Golden Ticket Creation</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/04/metasploit-golden-ticket.png</image:loc><image:title>Metasploit - Golden Ticket</image:title><image:caption>Metasploit - Golden Ticket</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/04/metasploit-golden-ticket-module-configuration.png</image:loc><image:title>Metasploit - Golden Ticket Module Configuration</image:title><image:caption>Metasploit - Golden Ticket Module Configuration</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/04/metasploit-kiwi-golden-ticket.png</image:loc><image:title>Metasploit Kiwi - Golden Ticket</image:title><image:caption>Metasploit Kiwi - Golden Ticket</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/04/metasploit-kiwi-list-of-kerberos-tickets.png</image:loc><image:title>Metasploit Kiwi - List of Kerberos Tickets</image:title><image:caption>Metasploit Kiwi - List of Kerberos Tickets</image:caption></image:image><lastmod>2018-04-09T01:45:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2018/04/04/dumping-clear-text-credentials/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/04/mimikatz-powersploit.png</image:loc><image:title>Mimikatz - PowerSploit</image:title><image:caption>Mimikatz - PowerSploit</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/04/windows-credential-editor.png</image:loc><image:title>Windows Credential Editor</image:title><image:caption>Windows Credential Editor</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/04/lsasecretread-read-lsa-secrets.png</image:loc><image:title>lsaSecretRead - Read LSA Secrets</image:title><image:caption>lsaSecretRead - Red LSA Secret Password</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/04/metasploit-lsa-secrets.png</image:loc><image:title>Metasploit - LSA Secrets</image:title><image:caption>Metasploit - LSA Secrets</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/04/impacket-registry-hives.png</image:loc><image:title>impacket - Registry Hives</image:title><image:caption>impacket - Registry Hives</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/04/dump-registry-hives.png</image:loc><image:title>Dump Registry Hives</image:title><image:caption>Dump Registry Hives</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/04/lsa-secrets-registry-location.png</image:loc><image:title>LSA Secrets - Registry Location</image:title><image:caption>LSA Secrets - Registry Location</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/04/lsa-secrets-registry-permissions.png</image:loc><image:title>LSA Secrets - Registry Permissions</image:title><image:caption>LSA Secrets - Registry Permissions</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/04/powershell-getwebcredentials.png</image:loc><image:title>PowerShell - GetWebCredentials</image:title><image:caption>Nishang - GetWebCredentials PowerShell Script</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/04/lasagne-browser-passwords.png</image:loc><image:title>Lasagne - Browser Passwords</image:title><image:caption>LaZagne - Browser Based Passwords</image:caption></image:image><lastmod>2018-04-03T15:54:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2018/01/16/microsoft-office-dde-attacks/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/01/word-load-dde-payload-from-another-document.png</image:loc><image:title>Word - Load DDE Payload from another document</image:title><image:caption>Word - Load DDE Payload from Another Document</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/01/word-dde-payload.png</image:loc><image:title>Word - DDE Payload</image:title><image:caption>Word - DDE Payload</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/01/word-dde-via-field-code.png</image:loc><image:title>Word - DDE via Field Code</image:title><image:caption>Word - DDE via Field Code</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/01/outlook-message-rtf-email-message.png</image:loc><image:title>Outlook Message - RTF Email Message</image:title><image:caption>Outlook Message - RTF Email Message</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/01/outlook-message-dde-in-rich-text.png</image:loc><image:title>Outlook Message - DDE in Rich Text</image:title><image:caption>Outlook Message - DDE and RTF</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/01/outlook-message-dde-payload.png</image:loc><image:title>Outlook Message - DDE Payload</image:title><image:caption>Outlook Message - DDE Payload</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/01/outlook-dde-via-calendar-invitations.png</image:loc><image:title>Outlook - DDE via Calendar Invitations</image:title><image:caption>Outlook - DDE via Calendar Invitations</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/01/outlook-dde-execution.png</image:loc><image:title>Outlook - DDE Execution</image:title><image:caption>Outlook - DDE Execution</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/01/outlook-foward-contact-with-dde.png</image:loc><image:title>Outlook - Foward Contact with DDE</image:title><image:caption>Outlook - Foward Contact with DDE</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/01/outlook-dde-payload-in-contact-notes.png</image:loc><image:title>Outlook - DDE Payload in Contact Notes</image:title><image:caption>Outlook - DDE Payload in Contact Notes</image:caption></image:image><lastmod>2018-01-17T20:51:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2018/01/08/command-and-control-javascript/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/jsrat-applocker-bypass.png</image:loc><image:title>JSRat - AppLocker Bypass</image:title><image:caption>JSRat - AppLocker Bypass Method</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/jsrat-run-executables.png</image:loc><image:title>JSRat - Run Executables</image:title><image:caption>JSRat - Run Executables</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/jsrat-data-exfiltration.png</image:loc><image:title>JSRat - Data Exfiltration</image:title><image:caption>JSRat - Data Exfiltration</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/jsrat-command-execution.png</image:loc><image:title>JSRat - Command Execution</image:title><image:caption>JSRat - Command Execution</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/jsrat-console.png</image:loc><image:title>JSRat - Console</image:title><image:caption>JSRat - Console</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/jsrat-implant-execution.png</image:loc><image:title>JSRat - Implant Execution</image:title><image:caption>JSRat - Implant Execution</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/jsrat-generated-command.png</image:loc><image:title>JSRat - Generated Command</image:title><image:caption>JSRat - Generated Command</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/jsrat-powershell-command-execution.png</image:loc><image:title>JSRat PowerShell - Command Execution</image:title><image:caption>JSRat PowerShell - Command Execution</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/jsrat-powershell-usage.png</image:loc><image:title>JSRat PowerShell - Usage</image:title><image:caption>JSRat PowerShell - Usage</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/jsrat-powershell-payload-command.png</image:loc><image:title>JSRat PowerShell - Payload Command</image:title><image:caption>JSRat PowerShell - Payload Command</image:caption></image:image><lastmod>2017-12-27T13:41:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2018/01/03/command-and-control-web-interface/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/ares-server.png</image:loc><image:title>Ares - Server</image:title><image:caption>Ares - Server</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/agent-detection-rate.png</image:loc><image:title>Agent - Detection Rate</image:title><image:caption>Agent - Detection Rate</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/ares-agent-configuration.png</image:loc><image:title>Ares - Agent Configuration</image:title><image:caption>Ares - Agent Configuration</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/ares-command-execution-list-of-users.png</image:loc><image:title>Ares - Command Execution - List of Users</image:title><image:caption>Ares - Command Execution - List of Users</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/ares-command-execution-ipconfig.png</image:loc><image:title>Ares - Command Execution - ipconfig</image:title><image:caption>Ares - Command Execution - ipconfig</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/ares-list-of-agents.png</image:loc><image:title>Ares - List of Agents</image:title><image:caption>Ares - List of Agents</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/ares-creating-agent.png</image:loc><image:title>Ares - Creating Agent</image:title><image:caption>Ares - Creating Agent</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/ares-main-interface.png</image:loc><image:title>Ares - Main Interface</image:title><image:caption>Ares - Main Interface</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/ares-passphrase.png</image:loc><image:title>Ares - Passphrase</image:title><image:caption>Ares - Passphrase</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/ares-password-setup.png</image:loc><image:title>Ares - Password Setup</image:title><image:caption>Ares - Password Setup</image:caption></image:image><lastmod>2017-12-26T14:50:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2018/01/02/command-and-control-images/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/01/implant-favicon-configuration.png</image:loc><image:title>Implant - Favicon Configuration</image:title><image:caption>Implant - Favicon Configuration</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/01/invoke-psimage-embedding-mimikatz-in-local-png.png</image:loc><image:title>Invoke-PSImage - Embedding Mimikatz in Local PNG</image:title><image:caption>Embedding Mimikatz in Local PNG</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/01/mimikatz-via-png-local.png</image:loc><image:title>Mimikatz via PNG - Local</image:title><image:caption>Mimikatz via PNG - Local</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/01/mimikatz-via-png-over-the-web.png</image:loc><image:title>Mimikatz via PNG over the Web</image:title><image:caption>Mimikatz via PNG over the Web</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/01/invoke-psimage-embedding-mimikatz-in-png.png</image:loc><image:title>Invoke-PSImage - Embedding Mimikatz in PNG</image:title><image:caption>Embedding Mimikatz in PNG - Web Version</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/01/meterpreter-via-favicon.png</image:loc><image:title>Meterpreter via Favicon</image:title><image:caption>Meterpreter via Favicon</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/01/implant-favicon.png</image:loc><image:title>Implant - Favicon</image:title><image:caption>Implant - Favicon</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/01/metasploit-multi-handler-module-for-favicon.png</image:loc><image:title>Metasploit - Multi Handler Module for Favicon</image:title><image:caption>Metasploit - Multi Handler Module for Favicon</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/01/generation-of-favicon.png</image:loc><image:title>Generation of Favicon</image:title><image:caption>Generation of Favicon</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2018/01/favicon-embeeded-command.png</image:loc><image:title>Favicon - Embeeded Command</image:title><image:caption>Favicon - Embeeded Command</image:caption></image:image><lastmod>2017-12-25T19:38:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/12/18/microsoft-office-ntlm-hashes-via-frameset/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/metasploit-smb-capture-module-ntlmv2-hash-via-frameset1.png</image:loc><image:title>Metasploit SMB Capture Module - NTLMv2 Hash via Frameset</image:title><image:caption>Metasploit SMB Capture Module - NTLMv2 Hash via Frameset</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/metasploit-smb-capture-module-for-frameset.png</image:loc><image:title>Metasploit - SMB Capture Module for Frameset</image:title><image:caption>Metasploit - SMB Capture Module</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/responder-ntlmv2-hash-via-frameset.png</image:loc><image:title>Responder - NTLMv2 Hash via Frameset</image:title><image:caption>Responder - NTLMv2 Hash via Frameset</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/word-connect-to-unc-path-via-frameset.png</image:loc><image:title>Word - Connect to UNC Path via Frameset</image:title><image:caption>Word - Connect to UNC Path via Frameset</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/frameset-responder-configuration.png</image:loc><image:title>Frameset - Responder Configuration</image:title><image:caption>Responder Configuration</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/websettings-xml-rels.png</image:loc><image:title>webSettings XML rels</image:title><image:caption>webSettings XML rels</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/websettings-xml-relationship-file-contents.png</image:loc><image:title>webSettings XML Relationship File - Contents</image:title><image:caption>webSettings XML Relationship File - Contents</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/websettings-with-frameset-adding-new-version-to-archive.png</image:loc><image:title>webSettings with Frameset - Adding new version to archive</image:title><image:caption>webSettings with Frameset - Adding new version to archive</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/websettings-xml-frameset.png</image:loc><image:title>webSettings XML - Frameset</image:title><image:caption>webSettings XML - Frameset</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/websettings-file.png</image:loc><image:title>webSettings File</image:title><image:caption>webSettings File</image:caption></image:image><lastmod>2017-12-18T11:41:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/12/15/microsoft-office-payloads-in-document-properties/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/virus-total-results-document-properties.png</image:loc><image:title>Virus Total Results - Document Properties</image:title><image:caption>Virus Total Results - Payload in Document Properties</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/metasploit-web-delivery-powershell-payload-via-document-properties.png</image:loc><image:title>Metasploit Web Delivery - PowerShell Payload via Document Properties</image:title><image:caption>Metasploit Web Delivery - Meterpreter via Document Properties</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/metasploit-smb-delivery-meterpreter-via-powershell-payload.png</image:loc><image:title>Metasploit SMB Delivery - Meterpreter via PowerShell Payload</image:title><image:caption>Metasploit SMB Delivery - Meterpreter via PowerShell Payload</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/document-properties-powershell-payload.png</image:loc><image:title>Document Properties PowerShell Payload</image:title><image:caption>Document Properties PowerShell Payload</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/metasploit-smb-delivery-powershell-payload.png</image:loc><image:title>Metasploit SMB Delivery - PowerShell Payload</image:title><image:caption>Metasploit SMB Delivery - PowerShell Payload</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/smb-delivery-powershell-payload.png</image:loc><image:title>SMB Delivery PowerShell Payload</image:title><image:caption>SMB Delivery PowerShell Payload</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/metasploit-smb-delivery-meterpreter.png</image:loc><image:title>Metasploit SMB Delivery - Meterpreter</image:title><image:caption>Metasploit SMB Delivery - Meterpreter</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/metasploit-smb-delivery-sessions.png</image:loc><image:title>Metasploit SMB Delivery - Sessions</image:title><image:caption>Metasploit SMB Delivery - Sessions</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/metasploit-smb-delivery-meterpreter-session.png</image:loc><image:title>Metasploit SMB Delivery Meterpreter Session</image:title><image:caption>Metasploit SMB Delivery Meterpreter Session</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/document-properties-word-macro.png</image:loc><image:title>Document Properties - Word Macro</image:title><image:caption>Document Properties - Word Macro</image:caption></image:image><lastmod>2017-12-15T14:32:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/12/13/smb-share-scf-file-attacks/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/metasploit-smb-relay-module.png</image:loc><image:title>Metasploit - SMB Relay Module</image:title><image:caption>Metasploit - SMB Relay Module</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/metasploit-multi-handler-module-for-smb-relay.png</image:loc><image:title>Metasploit - Multi Handler Module for SMB Relay</image:title><image:caption>Metasploit - Multi Handler Module </image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/metasploit-smb-relay-sessions.png</image:loc><image:title>Metasploit - SMB Relay Sessions</image:title><image:caption>Metasploit - SMB Relay Sessions</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/metasploit-smb-relay-attack.png</image:loc><image:title>Metasploit - SMB Relay Attack</image:title><image:caption>Metasploit - SMB Relay Attack</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/meterpreter-list-of-processes-for-migrate.png</image:loc><image:title>Meterpreter - List of Processes for Migrate</image:title><image:caption>Meterpreter - List of Processes for Migration</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/meterpreter-retrieve-current-uid.png</image:loc><image:title>Meterpreter - Retrieve Current UID</image:title><image:caption>Meterpreter - Retrieve Current UID</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/meterpreter-process-migration.png</image:loc><image:title>Meterpreter - Process Migration</image:title><image:caption>Meterpreter - Process Migration</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/meterpreter-list-running-processes.png</image:loc><image:title>Meterpreter - List Running Processes</image:title><image:caption>Meterpreter - List Running Processes</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/impacket-smb-relay-attack.png</image:loc><image:title>Impacket - SMB Relay Attack</image:title><image:caption>Impacket - SMB Relay Attack</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/impacket-smb-relay-server.png</image:loc><image:title>Impacket - SMB Relay Server</image:title><image:caption>Impacket - SMB Relay Server</image:caption></image:image><lastmod>2019-02-04T05:30:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/12/06/command-and-control-websocket/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/wsc2-cloned-website.png</image:loc><image:title>WSC2 - Cloned WebSite</image:title><image:caption>WSC2 - Cloned Website</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/wsc2-file-stored.png</image:loc><image:title>WSC2 - File Stored</image:title><image:caption>WSC2 - File Stored</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/wsc2-file-transfer.png</image:loc><image:title>WSC2 - File Transfer</image:title><image:caption>WSC2 -  File Transfer</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/wsc2-data-exfiltration.png</image:loc><image:title>WSC2 - Data Exfiltration</image:title><image:caption>WSC2 - Data Exfiltration</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/wsc2-command-execution.png</image:loc><image:title>WSC2 - Command Execution</image:title><image:caption>WSC2 - Command Execution</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/wsc2-shell-functionality.png</image:loc><image:title>WSC2 - Shell Functionality</image:title><image:caption>WSC2 - Shell Functionality</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/wsc2-agent-connection.png</image:loc><image:title>WSC2 - Agent Connection</image:title><image:caption>WSC2 - Agent Connection</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/wsc2-generation-of-stagers.png</image:loc><image:title>WSC2 - Generation of Stagers</image:title><image:caption>WSC2 - Generation of Stagers</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/12/wsc2-main-console.png</image:loc><image:title>WSC2 - Main Console</image:title><image:caption>WSC2 - Main Console</image:caption></image:image><lastmod>2017-12-06T18:00:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/11/20/command-and-control-wmi/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/11/wmiops-system-drive-information.png</image:loc><image:title>WMIOps - System Drive Information</image:title><image:caption>WMIOps - System Drive Information</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/11/wmiops-calculator.png</image:loc><image:title>WMIOps - Calculator</image:title><image:caption>WMIOps - Calculator</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/11/wmiops-start-a-process.png</image:loc><image:title>WMIOps - Start a Process</image:title><image:caption>WMIOps - Start a Remote Process</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/11/wmi-port-dcom.png</image:loc><image:title>WMI Port - DCOM</image:title><image:caption>WMI Port - DCOM</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/11/wmimplant-directory-listing.png</image:loc><image:title>WMImplant - Directory Listing</image:title><image:caption>WMImplant - Directory Listing</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/11/wmimplant-shell-commands.png</image:loc><image:title>WMImplant - Shell Commands</image:title><image:caption>WMImplant - Shell Commands</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/11/wmimplant-execution-of-powershell-scripts.png</image:loc><image:title>WMImplant - Execution of PowerShell Scripts</image:title><image:caption>WMImplant - Execution of PowerShell Scripts</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/11/wmimplant-authentication-and-basic-recon.png</image:loc><image:title>WMImplant - Authentication and Basic Recon</image:title><image:caption>WMImplant - Authentication and Basic Recon</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/11/wmimplant-main-menu.png</image:loc><image:title>WMImplant - Main Menu</image:title><image:caption>WMImplant - Main Menu</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/11/wmimplant-execution.png</image:loc><image:title>WMImplant - Execution</image:title><image:caption>WMImplant - Execution </image:caption></image:image><lastmod>2017-11-20T16:40:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/11/14/command-and-control-website/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/11/trevorc2-cloned-website.png</image:loc><image:title>TrevorC2 - Cloned Website</image:title><image:caption>TrevorC2 - Cloned Website</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/11/trevorc2-wireshark-traffic.png</image:loc><image:title>TrevorC2 - WireShark Traffic</image:title><image:caption>TrevorC2 - Wireshark Traffic</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/11/trevorc2-encrypted-command.png</image:loc><image:title>TrevorC2 - Encrypted Command</image:title><image:caption>TrevorC2 - Encrypted Command</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/11/trevorc2-encryption-key-data-location.png</image:loc><image:title>TrevorC2 - Encryption Key and Data Location</image:title><image:caption>TrevorC2 - Encryption Key and Data Location</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/11/trevorc2-powershell-implant.png</image:loc><image:title>TrevorC2 - PowerShell Implant</image:title><image:caption>TrevorC2 - PowerShell Implant</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/11/trevorc2-commands.png</image:loc><image:title>TrevorC2 - Commands</image:title><image:caption>TrevorC2 - Commands</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/11/trevorc2-server.png</image:loc><image:title>TrevorC2 - Server</image:title><image:caption>TrevorC2 - Server </image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/11/trevorc2-server-configuration.png</image:loc><image:title>TrevorC2 - Server Configuration</image:title><image:caption>TrevorC2 - Server Configuration</image:caption></image:image><lastmod>2017-11-14T16:01:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/11/08/hijack-digital-signatures-powershell-script/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/11/powershell-script-valid-signature-e1510082619334.png</image:loc><image:title>PowerShell Script - Valid Signature</image:title><image:caption>PowerShell Script - Valid Signature</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/11/powershell-script-invalid-signature.png</image:loc><image:title>PowerShell Script - Invalid Signature</image:title><image:caption>PowerShell Script - Invalid Signature</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/11/signed-powershell-script.png</image:loc><image:title>Signed PowerShell Script</image:title><image:caption>Signed PowerShell Script</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/11/unsigned-powershell-script.png</image:loc><image:title>Unsigned PowerShell Script</image:title><image:caption>Unsigned PowerShell Script</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/11/signed-mimikatz.png</image:loc><image:title>Signed Mimikatz</image:title><image:caption>Signed Mimikatz</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/11/unsigned-mimikatz.png</image:loc><image:title>Unsigned Mimikatz</image:title><image:caption>Unsigned Mimikatz</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/11/signed-mimikatz-valid-signature.png</image:loc><image:title>Signed Mimikatz - Valid Signature</image:title><image:caption>Signed Mimikatz - Valid Signature</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/11/signed-mimikatz-invalid-signature.png</image:loc><image:title>Signed Mimikatz - Invalid Signature</image:title><image:caption>Signed Mimikatz - Invalid Signature</image:caption></image:image><lastmod>2018-01-30T19:12:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/11/06/hijacking-digital-signatures/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/10/digital-signature-details-valid-hash.png</image:loc><image:title>Digital Signature Details - Valid Hash</image:title><image:caption>Digital Signature Details - Valid Hash</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/10/authenticode-signature-powershell-script-with-digital-signature.png</image:loc><image:title>Authenticode Signature - PowerShell Script with Digital Signature</image:title><image:caption>Authenticode Signature - PowerShell Script with Digital Signature</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/10/authenticode-signature-powershell-scripts.png</image:loc><image:title>Authenticode Signature - PowerShell Scripts</image:title><image:caption>Authenticode Signature  - PowerShell Scripts</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/10/powershell-script-microsoft-digital-signature.png</image:loc><image:title>PowerShell Script - Microsoft Digital Signature</image:title><image:caption>PowerShell Script - Microsoft Digital Signature</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/10/powershell-script-digital-microsoft-signature.png</image:loc><image:title>PowerShell Script - Digital Microsoft Signature</image:title><image:caption>PowerShell Script - Digital Microsoft Signature</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/10/signature-verification-attack-registry-values.png</image:loc><image:title>Signature Verification Attack - Registry Values</image:title><image:caption>Signature Verification Attack - Registry Values</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/10/signature-verification-attack-registry-keys.png</image:loc><image:title>Signature Verification Attack - Registry Keys</image:title><image:caption>Signature Verification Attack - Registry Keys</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/10/authenticode-signature-hash-validation.png</image:loc><image:title>Authenticode Signature - Hash Validation</image:title><image:caption>Authenticode Signature - Hash Validation</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/10/bypass-hash-validation-registry-hijack.png</image:loc><image:title>Bypass Hash Validation - Registry Hijack</image:title><image:caption>Bypass Hash Validation - Registry Hijack</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/10/metatwin-digital-signature-details.png</image:loc><image:title>MetaTwin - Digital Signature Details</image:title><image:caption>MetaTwin - Digital Signature Details</image:caption></image:image><lastmod>2019-05-30T09:34:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/10/04/command-and-control-https/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/10/thundershell-read-files.png</image:loc><image:title>ThunderShell - Read Files</image:title><image:caption>ThunderShell  - Read Files</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/10/thundershell-interaction-with-the-shell.png</image:loc><image:title>ThunderShell - Interaction with the Shell</image:title><image:caption>ThunderShell - Interaction with the Shell</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/10/thundershell-list-active-shells.png</image:loc><image:title>ThunderShell - List Active Shells</image:title><image:caption>ThunderShell - List Active Shells</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/10/thundershell-mimikatz.png</image:loc><image:title>ThunderShell - Mimikatz</image:title><image:caption>ThunderShell - Mimikatz</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/10/thundershell-mimikatz-execution.png</image:loc><image:title>ThunderShell - Mimikatz Execution</image:title><image:caption>ThunderShell - Mimikatz Execution</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/10/thundershell-executing-commands.png</image:loc><image:title>ThunderShell - Executing Commands</image:title><image:caption>ThunderShell - Executing Commands</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/10/thundershell-shell.png</image:loc><image:title>ThunderShell - Shell</image:title><image:caption>ThunderShell - Shell</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/10/thundershell-console.png</image:loc><image:title>ThunderShell - Console</image:title><image:caption>ThunderShell - Console</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/10/thundershell-configuration.png</image:loc><image:title>ThunderShell - Configuration</image:title><image:caption>ThunderShell - Configuration</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/10/thundershell-implant-execution.png</image:loc><image:title>ThunderShell - Implant Execution</image:title><image:caption>ThunderShell - Implant Execution</image:caption></image:image><lastmod>2017-10-01T16:43:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/10/02/command-and-control-kernel/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/redsails-shell-via-closed-port.png</image:loc><image:title>redsails - Shell via Closed Port</image:title><image:caption>redsails - Shell via Closed Port</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/redsails-port-22-is-not-active.png</image:loc><image:title>redsails - Port 22 is not Active</image:title><image:caption>redsails  - Port 22 is not Active</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/redsails-no-active-connections.png</image:loc><image:title>redsails - No Active Connections</image:title><image:caption>redsails - No Active Connections</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/redsails-executing-shell-commands.png</image:loc><image:title>redsails - Executing Shell Commands</image:title><image:caption>redsails - Executing Shell Commands</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/redsails-client-parameters.png</image:loc><image:title>redsails - Client Parameters</image:title><image:caption>redsails - Client Parameters </image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/redsails-powershell.png</image:loc><image:title>redsails - PowerShell</image:title><image:caption>redsails - PowerShell</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/redsails-executing-mimikatz.png</image:loc><image:title>redsails - Executing Mimikatz</image:title><image:caption>redsails - Executing Mimikatz</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/redsails-meterpreter-connection-active.png</image:loc><image:title>redsails - Meterpreter Connection Active</image:title><image:caption>redsails - Meterpreter Connection Active</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/redsails-meterpreter-session.png</image:loc><image:title>redsails - Meterpreter Session</image:title><image:caption>redsails - Meterpreter Session </image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/redsails-execute-shellcode-via-powershell.png</image:loc><image:title>redsails - Execute Shellcode via PowerShell</image:title><image:caption>redsails - Execute Shellcode via PowerShell</image:caption></image:image><lastmod>2017-09-30T10:48:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/09/26/command-and-control-twitter/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/twittor-access-permissions.png</image:loc><image:title>Twittor - Access Permissions</image:title><image:caption>Twittor - Access Permissions </image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/twittor-python-shellcode.png</image:loc><image:title>Twittor - Python Shellcode</image:title><image:caption>Twittor - Python Shellcode</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/twittor-display-command-output.png</image:loc><image:title>Twittor - Display Command Output</image:title><image:caption>Twittor - Display Command Output</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/twittor-decoding-base64-commands.png</image:loc><image:title>Twittor - Decoding Base64 Commands</image:title><image:caption>Twittor - Decoding Base64 Commands</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/twittor-direct-messages.png</image:loc><image:title>Twittor - Direct Messages</image:title><image:caption>Twittor - Direct Messages</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/twittor-execute-command.png</image:loc><image:title>Twittor - Execute Command</image:title><image:caption>Twittor - Execute Command</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/twittor-list-of-commands.png</image:loc><image:title>Twittor - List of Commands</image:title><image:caption>Twittor - List of Commands</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/twittor-retrieve-alive-bots.png</image:loc><image:title>Twittor - Retrieve Alive Bots</image:title><image:caption>Twittor - Retrieve Alive Bots</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/twittor-consumer-and-access-token.png</image:loc><image:title>Twittor - Consumer and Access Token</image:title><image:caption>Twittor - Consumer and Access Token</image:caption></image:image><lastmod>2017-09-24T17:08:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/09/25/suid-executables/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/vim-root-shell.png</image:loc><image:title>Vim - Root Shell</image:title><image:caption>Vim - Root Shell</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/less-root-shell.png</image:loc><image:title>Less - Root Shell</image:title><image:caption>Less - Root Shell</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/bash-root-shell.png</image:loc><image:title>Bash - Root Shell</image:title><image:caption>Bash - Root Shell</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/vim-reading-root-files.png</image:loc><image:title>Vim - Reading Root Files</image:title><image:caption>Vim - Reading Root Files</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/root-shell-via-find.png</image:loc><image:title>Root Shell via Find</image:title><image:caption>Root Shell via Find</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/run-netcat-via-find.png</image:loc><image:title>Run Netcat via Find</image:title><image:caption>Run Netcat via Find</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/find-command-execution.png</image:loc><image:title>Find Command Execution</image:title><image:caption>Find Command Execution</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/root-shell-via-suid-nmap.png</image:loc><image:title>Root Shell via SUID Nmap</image:title><image:caption>Root Shell via Suid Nmap Binary</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/nmap-interactive-mode.png</image:loc><image:title>Nmap - Interactive Mode</image:title><image:caption>Nmap - Interactive Mode</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/nmap-version-identification.png</image:loc><image:title>Nmap Version Identification</image:title><image:caption>Nmap Version Identification</image:caption></image:image><lastmod>2021-11-12T16:00:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/09/14/command-and-control-website-keyword/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/c2-website-keyword-excel-macro-shell.png</image:loc><image:title>C2 Website Keyword - Excel Macro Shell</image:title><image:caption>C2 Website Keyword - Meterpreter via Excel Macro</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/c2code-running-excel-macro.png</image:loc><image:title>C2Code - Running Excel Macro</image:title><image:caption>C2Code Running Excel Macro</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/c2code-excel-macro.png</image:loc><image:title>C2Code - Excel Macro</image:title><image:caption>C2Code - Excel Macro</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/c2-website-keyword-sysinfo.png</image:loc><image:title>C2 Website Keyword - Sysinfo</image:title><image:caption>C2 Website Keyword - Sysinfo</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/c2-website-keyword-meterpreter.png</image:loc><image:title>C2 Website Keyword - Meterpreter</image:title><image:caption>C2 Website Keyword - Meterpreter</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/c2code-implant.png</image:loc><image:title>C2Code - Implant</image:title><image:caption>C2Code - Implant</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/c2code-powershell-script.png</image:loc><image:title>C2Code - PowerShell Script</image:title><image:caption>C2Code - PowerShell Script</image:caption></image:image><lastmod>2017-09-14T10:35:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/09/12/command-and-control-webdav/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/webdavc2-implant-execution.png</image:loc><image:title>WebDAVC2 - Implant Execution</image:title><image:caption>WebDAVC2 - Implant Execution</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/webdav-server-serving-payload-into-chunks.png</image:loc><image:title>WebDAV Server - Serving Payload into chunks</image:title><image:caption>WebDAV Server - Serving Payload into chunks</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/webdav-payload-via-propfind-responses.png</image:loc><image:title>WebDAV - Payload via PROPFIND Responses</image:title><image:caption>WebDAV - Payload via PROPFIND Responses</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/webdavc2-executing-commands.png</image:loc><image:title>WebDAVC2 - Executing Commands</image:title><image:caption>WebDAVC2 - Executing Commands</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/webdavc2-bat-stager.png</image:loc><image:title>WebDAVC2 - BAT Stager</image:title><image:caption>WebDAVC2 - BAT Stager</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/webdavc2.png</image:loc><image:title>WebDAVC2</image:title><image:caption>WebDAVC2 </image:caption></image:image><lastmod>2017-09-12T17:14:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/09/06/command-and-control-dns/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/dnscat2-command-shell-request.png</image:loc><image:title>Dnscat2 - Command Shell Request</image:title><image:caption>Dnscat2 - Command Shell Request</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/dnscat2-shell.png</image:loc><image:title>Dnscat2 - Shell</image:title><image:caption>Dnscat2 - Shell</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/dnscat2-powershell-command.png</image:loc><image:title>Dnscat2 - PowerShell Command</image:title><image:caption>Dnscat2 - PowerShell Command</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/dnscat2-windows-client.png</image:loc><image:title>Dnscat2 - Windows Client</image:title><image:caption>Dnscat2 - Windows Client</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/dnscat2-powershell.png</image:loc><image:title>Dnscat2 - PowerShell</image:title><image:caption>Dnscat2 - PowerShell</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/dnscat2-start-new-process.png</image:loc><image:title>Dnscat2 - Start New Process</image:title><image:caption>Dnscat2 - Start New Process</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/dnscat2-executing-shell-commands.png</image:loc><image:title>Dnscat2 - Executing Shell Commands</image:title><image:caption>Dnscat2 - Executing Shell Commands</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/dnscat2-list-of-commands.png</image:loc><image:title>Dnscat2 - List of Commands</image:title><image:caption>Dnscat2 - List of Commands</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/dnscat2-interactive-session.png</image:loc><image:title>Dnscat2 - Interactive Session</image:title><image:caption>Dnscat2 - Interactive Session</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/dnscat2-server.png</image:loc><image:title>Dnscat2 - Server</image:title><image:caption>Dnscat2 - Server</image:caption></image:image><lastmod>2020-03-09T17:34:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/09/01/command-and-control-windows-com/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/koadic-script-prompt.png</image:loc><image:title>Koadic - Script Prompt</image:title><image:caption>Koadic - Script Prompt</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/koadic-password-box.png</image:loc><image:title>Koadic - Password Box</image:title><image:caption>Koadic - Password Box</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/koadic-tcp-scanner-results.png</image:loc><image:title>Koadic - TCP Scanner Results</image:title><image:caption>Koadic - TCP Scanner Results</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/koadic-tcp-scanner.png</image:loc><image:title>Koadic - TCP Scanner</image:title><image:caption>Koadic - TCP Scanner</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/koadic-implants.png</image:loc><image:title>Koadic - Implants</image:title><image:caption>Koadic - Implants</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/koadic-command-execution.png</image:loc><image:title>Koadic - Command Execution</image:title><image:caption>Koadic - Command Execution</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/koadic-elevated-session.png</image:loc><image:title>Koadic - Elevated Session</image:title><image:caption>Koadic - Elevated Session</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/koadic-bypass-uac-sdclt.png</image:loc><image:title>Koadic - Bypass UAC SDCLT</image:title><image:caption>Koadic - Bypass UAC SDCLT</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/koadic-interact-with-zombies.png</image:loc><image:title>Koadic - Interact with Zombies</image:title><image:caption>Koadic - Interaction with Zombies</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/09/mshta-execution-on-the-target.png</image:loc><image:title>MSHTA - Execution on the target</image:title><image:caption>MSHTA - Execution on the target</image:caption></image:image><lastmod>2017-09-03T06:55:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/08/29/command-and-control-dropbox/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/08/dropbox-agent-generated-files.png</image:loc><image:title>DropBox - Agent Generated Files</image:title><image:caption>DropBox - Agent Generated Files</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/08/dbc2-command-execution.png</image:loc><image:title>DBC2 - Command Execution</image:title><image:caption>DBC2 - Command Execution</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/08/dbc2-list-available-agents.png</image:loc><image:title>DBC2 - List Available Agents</image:title><image:caption>DBC2 - List Available Agents</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/08/dropboxc2-publish-modules.png</image:loc><image:title>DropBoxC2 - Publish Modules</image:title><image:caption>DropBoxC2 - Publish Modules</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/08/dbc2-screenshot.png</image:loc><image:title>DBC2 - Screenshot</image:title><image:caption>DBC2 - Screenshot</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/08/dbc2-powershell.png</image:loc><image:title>DBC2 - PowerShell</image:title><image:caption>DBC2 - PowerShell</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/08/dbc2-transfer-of-files.png</image:loc><image:title>DBC2 - Transfer of Files</image:title><image:caption>DBC2 - Transfer of Files</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/08/dbc2-bat-stager.png</image:loc><image:title>DBC2 - Bat Stager</image:title><image:caption>DBC2 - Bat Stager</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/08/dbc2-oneliner-stager.png</image:loc><image:title>DBC2 - OneLiner Stager</image:title><image:caption>DBC2 - OneLiner Stager</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/08/dropboxc2-list-available-stagers.png</image:loc><image:title>DropBoxC2 - List Available Stagers</image:title><image:caption>DropBoxC2 - List Available Stagers</image:caption></image:image><lastmod>2017-09-01T19:44:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/08/19/command-and-control-powershell/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/08/poshc2-implant-features.png</image:loc><image:title>PoshC2 - Implant Features</image:title><image:caption>PoshC2 - Implant Features</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/08/poshc2-dir-command.png</image:loc><image:title>PoshC2 - Dir Command</image:title><image:caption>PoshC2 - DIR Command</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/08/poshc2-interact-with-implant.png</image:loc><image:title>PoshC2 - Interact with Implant</image:title><image:caption>PoshC2 - Interact with Implant</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/08/poshc2-red-team-activities.png</image:loc><image:title>PoshC2 - Red Team Activities</image:title><image:caption>PoshC2 - Red Team Activities</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/08/poshc2-techniques.png</image:loc><image:title>PoshC2 - Techniques</image:title><image:caption>PoshC2 - Techniques</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/08/poshc2-configuration.png</image:loc><image:title>PoshC2 - Configuration</image:title><image:caption>PoshC2 - Configuration</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/08/poshc2-installation.png</image:loc><image:title>PoshC2 - Installation</image:title><image:caption>PoshC2 - Installation</image:caption></image:image><lastmod>2017-08-21T06:44:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/08/03/command-and-control-gmail/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/07/gmail-allow-less-secure-apps.png</image:loc><image:title>Gmail - Allow Less Secure Apps</image:title><image:caption>Gmail - Allow Less Secure Apps</image:caption></image:image><lastmod>2017-08-03T00:09:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/07/28/command-and-control-icmp/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/07/pix-c2-icmp-c2.png</image:loc><image:title>PiX-C2 ICMP C2</image:title><image:caption>PiX-C2 - ICMP C2</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/07/icmp-shell-automation.png</image:loc><image:title>ICMP Shell - Automation</image:title><image:caption>ICMP Shell - Automation</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/07/icmp-shell.png</image:loc><image:title>ICMP Shell</image:title><image:caption>Shell over ICMP</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/07/icmp-shell-executing-binary.png</image:loc><image:title>ICMP Shell - Executing Binary</image:title><image:caption>ICMP Shell - Executing Binary</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/07/powershell-icmp-shell.png</image:loc><image:title>PowerShell - ICMP Shell</image:title><image:caption>PowerShell - ICMP Shell</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/07/nishang-module-icmp-shell.png</image:loc><image:title>Nishang Module - ICMP Shell</image:title><image:caption>Nishang Module - ICMP Shell</image:caption></image:image><lastmod>2017-08-01T21:51:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/07/26/bypassing-antivirus-host-intrusion-prevention-systems/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/07/meterpreter-paranoid-mode.png</image:loc><image:title>Meterpreter Paranoid Mode</image:title><image:caption>Meterpreter Paranoid Mode</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/07/meterpreter-receiving-the-encrypted-connection.png</image:loc><image:title>Meterpreter - Receiving the Encrypted Connection</image:title><image:caption>Meterpreter - Receiving the Encrypted Connection</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/07/configuring-the-encrypted-listener.png</image:loc><image:title>Configuring the Encrypted Listener</image:title><image:caption>Configuring the Encrypted Listener</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/07/generating-encrypted-payload.png</image:loc><image:title>Generating Encrypted Payload</image:title><image:caption>Generating Encrypted Payload</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/07/generate-certificate-with-metasploit.png</image:loc><image:title>Generate Certificate with Metasploit</image:title><image:caption>Generate Certificate with Metasploit</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/07/generate-certificate-manually.png</image:loc><image:title>Generate Certificate Manually</image:title><image:caption>Generate Certificate Manually</image:caption></image:image><lastmod>2017-07-26T14:57:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/07/07/applocker-bypass-createrestrictedtoken/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/07/applocker-bypass-createrestrictedtoken.png</image:loc><image:title>AppLocker Bypass - CreateRestrictedToken</image:title><image:caption>AppLocker Bypass - CreateRestrictedToken</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/07/executing-an-untrusted-binary.png</image:loc><image:title>Executing an Untrusted Binary</image:title><image:caption>Executing an untrusted binary</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/07/applocker-patch-is-missing.png</image:loc><image:title>AppLocker Patch is Missing</image:title><image:caption>AppLocker Patch is Missing</image:caption></image:image><lastmod>2017-07-07T16:43:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/07/06/applocker-bypass-msxsl/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/07/powershell-msxsl.png</image:loc><image:title>PowerShell - MSXSL</image:title><image:caption>PowerShell via MSXSL</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/07/applocker-bypass-msxsl.png</image:loc><image:title>AppLocker Bypass - MSXSL</image:title><image:caption>AppLocker Bypass - msxsl</image:caption></image:image><lastmod>2017-07-07T08:21:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/06/26/injecting-metasploit-payloads-into-android-applications-manually/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/signing-the-apk.png</image:loc><image:title>Signing the APK</image:title><image:caption>Signing the APK</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/injecting-the-hook.png</image:loc><image:title>Injecting the hook</image:title><image:caption>Injecting the Hook</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/identification-of-code-to-be-replaced.png</image:loc><image:title>Identification of code to be replaced</image:title><image:caption>Identification of code to be replaced</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/identification-of-main-activity.png</image:loc><image:title>Identification of Main Activity</image:title><image:caption>Identification of Main Activity</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/meterpreter-via-injected-android-apk.png</image:loc><image:title>Meterpreter via Injected Android APK</image:title><image:caption>Meterpreter via Injected Android APK</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/building-the-injected-apk.png</image:loc><image:title>Building the Injected APK</image:title><image:caption>Building the Injected APK</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/injecting-the-apk-with-excessive-permissions.png</image:loc><image:title>Injecting the APK with Excessive Permissions</image:title><image:caption>Injecting the APK with Excessive Permissions </image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/decompiling-apks.png</image:loc><image:title>Decompiling APKs</image:title><image:caption>Decompiling APKs</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/generate-apk-meterpreter-payload.png</image:loc><image:title>Generate APK - Meterpreter Payload</image:title><image:caption>Generate APK Payload via Metasploit</image:caption></image:image><lastmod>2020-08-05T17:01:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/06/16/applocker-bypass-msiexec/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/msiexec-meterpreter.png</image:loc><image:title>MSIEXEC - Meterpreter</image:title><image:caption>MSIEXEC - Meterpreter</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/msi-meterpreter-payload.png</image:loc><image:title>MSI - Meterpreter Payload</image:title><image:caption>MSI - Meterpreter Payload</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/msiexec-via-run.png</image:loc><image:title>MSIEXEC via Run</image:title><image:caption>MSIEXEC via Run</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/msiexec-powershell.png</image:loc><image:title>MSIEXEC - PowerShell</image:title><image:caption>MSIEXEC - PowerShell</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/msfvenom-generating-msi-files.png</image:loc><image:title>MsfVenom - Generating MSI Files</image:title><image:caption>MsfVenom - Generating MSI Files</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/msiexec-command-prompt-via-png.png</image:loc><image:title>msiexec - Command Prompt via PNG</image:title><image:caption>MSIEXEC - Command Prompt via PNG</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/msiexec-command-prompt.png</image:loc><image:title>msiexec - Command Prompt</image:title><image:caption>MSIEXEC - Command Prompt</image:caption></image:image><lastmod>2017-06-16T11:39:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/06/14/intel-sysret/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/sysret-verification-of-authority.png</image:loc><image:title>Sysret - Verification of Authority</image:title><image:caption>Sysret - Verification of Authority</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/sysret-privilege-escalation.png</image:loc><image:title>Sysret - Privilege Escalation</image:title><image:caption>Sysret - Privilege Escalation</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/sysret-identify-process-id-of-explorer-exe.png</image:loc><image:title>Sysret - Identify Process ID of explorer.exe</image:title><image:caption>Sysret - Identify process ID of explorer.exe</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/sysret-retrieving-processes.png</image:loc><image:title>Sysret - Retrieving Processes</image:title><image:caption>Sysret - Retrieving Processes</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/meterpreter-sysret.png</image:loc><image:title>Meterpreter - SysRet</image:title><image:caption>Meterpreter - Privilege Escalation via Sysret</image:caption></image:image><lastmod>2017-06-14T08:07:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/06/13/applocker-bypass-ieexec/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/applocker-blocks-binary.png</image:loc><image:title>AppLocker Blocks Binary</image:title><image:caption>AppLocker Blocks Binary</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/disabling-code-access-security-policy.png</image:loc><image:title>Disabling Code Access Security Policy</image:title><image:caption>Disabling Code Access Security Policy</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/ieexec-bypassing-applocker.png</image:loc><image:title>IEExec - Bypassing AppLocker</image:title><image:caption>IEExec -Bypassing AppLocker</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/ieexec-dot-net-64bit-application.png</image:loc><image:title>IEExec - Dot NET 64bit Application</image:title><image:caption>IEExec - Dot NET 64bit Application</image:caption></image:image><lastmod>2017-06-13T09:57:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/06/12/applocker-bypass-file-extensions/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/nishang-compiled-html-file-and-shortcut-with-embedded-payload.png</image:loc><image:title>Nishang - Compiled HTML File and Shortcut with Embedded Payload</image:title><image:caption>Nishang - Compiled HTML File and Shortcut with Embedded Payload</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/metasploit-web-delivery-module-powershell.png</image:loc><image:title>Metasploit - Web Delivery Module PowerShell</image:title><image:caption>Web Delivery Module - PowerShell Payload </image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/web-delivery-meterpreter.png</image:loc><image:title>Web Delivery - Meterpreter</image:title><image:caption>Web Delivery - Obtaining Meterpreter Sessions</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/command-prompt-execute-bat-file.png</image:loc><image:title>Command Prompt - Execute BAT File</image:title><image:caption>Command Prompt - Execute a bat file as txt</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/applocker-restriction-on-bat-files.png</image:loc><image:title>AppLocker - Restriction on BAT Files</image:title><image:caption>AppLocker - Restriction on bat files</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/nishang-compiled-html-file-with-embedded-payload.png</image:loc><image:title>Nishang - Compiled HTML File with Embedded Payload</image:title><image:caption>Nishang - Compiled HTML File with Embedded Payload</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/nishang-word-and-excel-with-embedded-payloads.png</image:loc><image:title>Nishang - Word and Excel with embedded Payloads</image:title><image:caption>Nishang - Word and Excel with Embedded Payloads</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/powershell-executing-commnad-from-a-txt.png</image:loc><image:title>PowerShell - Executing Commnad from a txt</image:title><image:caption>PowerShell - Executing Payload from a txt file</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/nishang-file-extensions.png</image:loc><image:title>Nishang - File Extensions</image:title><image:caption>Nishang - Generated File Extensions</image:caption></image:image><lastmod>2017-06-12T12:45:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/06/09/uac-bypass-sdclt/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/sdclt-uac-bypass-via-uacme.png</image:loc><image:title>sdclt - UAC Bypass via UACMe</image:title><image:caption>sdclt - UAC Bypass via UACME</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/sdclt-cmd-and-notepad-as-high-integrity-processes.png</image:loc><image:title>sdclt - cmd and notepad as High Integrity Processes</image:title><image:caption>sdclt - cmd and notepad as High Integrity Processes</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/sdclt-elevated-command-prompt.png</image:loc><image:title>sdclt - Elevated Command Prompt</image:title><image:caption>sdclt - Elevated Command Prompt</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/sdclt-uac-bypass-powershell-script.png</image:loc><image:title>Sdclt UAC Bypass - Powershell Script</image:title><image:caption>sdclt UAC Bypass - PowerShell Script</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/sdclt-fileless-elevated-command-prompt.png</image:loc><image:title>sdclt Fileless - Elevated Command Prompt</image:title><image:caption>sdclt Fileless - Elevated Command prompt</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/app-paths-uac-bypass-registry.png</image:loc><image:title>App Paths - UAC Bypass Registry</image:title><image:caption>App Paths - UAC Bypass Registry</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/sdclt-control-panel-starts-as-high-integrity-process.png</image:loc><image:title>sdclt - Control Panel starts as High Integrity Process</image:title><image:caption>sdclt - High Integrity Process</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/fileless-uac-isolated-command-registry.png</image:loc><image:title>Fileless UAC - Isolated Command Registry</image:title><image:caption>Sdclt Fileless UAC - Isolated Command Registry</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/fileless-uac-bypass-sdclt-powershell.png</image:loc><image:title>Fileless UAC Bypass - sdclt PowerShell</image:title><image:caption>Fileless UAC Bypass - sdclt - PoweShell</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/app-paths-uac-bypass-via-powershell.png</image:loc><image:title>App Paths - UAC Bypass via PowerShell</image:title><image:caption>App Path - UAC Bypass via PowerShell</image:caption></image:image><lastmod>2017-06-13T09:54:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/06/07/uac-bypass-fodhelper/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/fodhelper-creating-the-registry-structure-manually.png</image:loc><image:title>Fodhelper - Creating the Registry Structure Manually</image:title><image:caption>Fodhelper - Creating the Registry Structure Manually</image:caption></image:image><lastmod>2017-06-07T15:30:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/06/06/applocker-bypass-assembly-load/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/applocker-rule-block-shellcode-binary.png</image:loc><image:title>AppLocker Rule - Block ShellCode Binary</image:title><image:caption>AppLocker Rule - Block ShellCode Binary</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/applocker-rule-block-executables.png</image:loc><image:title>AppLocker Rule - Block Executables</image:title><image:caption>AppLocker Rule - Block Executables</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/assembly-load.png</image:loc><image:title>Assembly Load</image:title><image:caption>Assembly Load</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/meterpreter-shellcode.png</image:loc><image:title>Meterpreter - ShellCode</image:title><image:caption>Meterpreter - Shellcode</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/compiling-c-code-to-executable.png</image:loc><image:title>Compiling C# Code to Executable</image:title><image:caption>Compiling C# Code to Executable</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/c-shellcode.png</image:loc><image:title>C# Shellcode</image:title><image:caption>C# Shellcode Generation</image:caption></image:image><lastmod>2017-06-07T08:19:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/06/05/applocker-bypass-bginfo/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/execute-bgi-file-via-run.png</image:loc><image:title>Execute BGI File via Run</image:title><image:caption>Execute BGI FIle via Run</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/bginfo-command-prompt.png</image:loc><image:title>BgInfo and Command Prompt</image:title><image:caption>BgInfo &amp; Command Prompt</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/bginfo-bypass-command-prompt1.png</image:loc><image:title>BgInfo Bypass Command Prompt</image:title><image:caption>BgInfo Bypass - Command Prompt</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/bginfo-bypass-command-prompt.png</image:loc><image:title>BgInfo Bypass - Command Prompt</image:title><image:caption>BgInfo AppLocker Bypass - Configuration</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/bginfo-vbsmeter.png</image:loc><image:title>BgInfo - VBSMeter</image:title><image:caption>BgInfo - VBSMeter</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/bginfo-run-cmd.png</image:loc><image:title>BgInfo - Run CMD</image:title><image:caption>BgInfo - Run CMD</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/running-command-prompt-via-bginfo.png</image:loc><image:title>Running Command Prompt via BgInfo</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/06/meterpreter-bginfo.png</image:loc><image:title>Meterpreter - Bginfo</image:title><image:caption>Meterpreter - BgInfo</image:caption></image:image><lastmod>2017-06-05T09:41:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/05/29/applocker-bypass-msbuild/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/executing-shellcode-via-msbuild.png</image:loc><image:title>Executing ShellCode via MSBuild</image:title><image:caption>Executing ShellCode via MSBuild</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/meterpreter-via-msbuild.png</image:loc><image:title>Meterpreter via MSBuild</image:title><image:caption>Meterpreter via MSBuild</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/msbuild-psattack.png</image:loc><image:title>MSBuild - PSAttack</image:title><image:caption>MSBuild - PSAttack</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/msbuild-executing-psattack.png</image:loc><image:title>MSBuild - Executing PSAttack</image:title><image:caption>MSBuild - Executing PSAttack</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/msbuildshell.png</image:loc><image:title>MSBuildShell</image:title><image:caption>MSBuildShell</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/msbuild-msbuildshell.png</image:loc><image:title>MSBuild - MSBuildShell</image:title><image:caption>MSBuild - MSBuildShell</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/msbuild-powershell.png</image:loc><image:title>MSBuild - PowerShell</image:title><image:caption>MSBuild - PowerShell</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/msbuild-dumping-credentials-via-mimikatz.png</image:loc><image:title>MSBuild - Dumping Credentials via Mimikatz</image:title><image:caption>MSBuild - Dumping Credentials via Mimikatz</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/msbuild-mimikatz.png</image:loc><image:title>MSBuild - Mimikatz</image:title><image:caption>MSBuild - Mimikatz</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/msbuild-executing-mimikatz.png</image:loc><image:title>MSBuild - Executing Mimikatz</image:title><image:caption>MSBuild - Executing Mimikatz</image:caption></image:image><lastmod>2017-05-30T09:29:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/05/24/applocker-bypass-control-panel/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/applocker-bypass-command-prompt-via-control-panel.png</image:loc><image:title>AppLocker Bypass - Command Prompt via Control Panel</image:title><image:caption>AppLocker Bypass - Command Prompt via Control Panel</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/registry-editor-add-cpl-key.png</image:loc><image:title>Registry Editor - Add CPL Key</image:title><image:caption>Registry Editor - Add CPL Key</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/applocker-add-key-to-the-registry.png</image:loc><image:title>AppLocker - Add Key to the Registry</image:title><image:caption>AppLocker Bypass - Add Key to the Registry</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/applocker-bypass-cmd-blocked.png</image:loc><image:title>AppLocker Bypass - CMD Blocked</image:title><image:caption>AppLocker Bypass - CMD Blocked</image:caption></image:image><lastmod>2017-05-22T08:13:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/05/23/applocker-bypass-rundll32/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/applocker-rundll32-registry-unlocked.png</image:loc><image:title>AppLocker - Rundll32 Registry Unlocked</image:title><image:caption>AppLocker  - Rundll32 Registry Unlocked</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/applocker-registry-unlocked.png</image:loc><image:title>AppLocker - Registry Unlocked</image:title><image:caption>AppLocker - Registry Unlocked</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/applocker-rundll32-registry.png</image:loc><image:title>AppLocker - Rundll32 Registry</image:title><image:caption>AppLocker - Rundll32 Registry</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/applocker-registry-blocked.png</image:loc><image:title>AppLocker - Registry Blocked</image:title><image:caption>AppLocker - Registry Blocked</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/web-delivery-module-configuration.png</image:loc><image:title>Web Delivery Module Configuration</image:title><image:caption>Web Delivery Module Configuration</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/web-delivery-payload.png</image:loc><image:title>Web Delivery Payload</image:title><image:caption>Web Delivery Payload</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/rundll32-javascript.png</image:loc><image:title>Rundll32 - JavaScript</image:title><image:caption>Rundll32 - JavaScript</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/rundll32-meterpreter.png</image:loc><image:title>Rundll32 - Meterpreter</image:title><image:caption>Rundll32 - Meterpreter</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/rundll32-injecting-dll-into-a-process.png</image:loc><image:title>Rundll32 - Injecting DLL into a Process</image:title><image:caption>AppLocker Bypass - Rundll32 via DLL</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/msfvenom-dll-generation.png</image:loc><image:title>Msfvenom - DLL Generation</image:title><image:caption>Msfvenom  DLL Generation</image:caption></image:image><lastmod>2017-05-24T17:32:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/05/22/applocker-bypass-weak-path-rules/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/applocker-bypass-weak-path-rules.png</image:loc><image:title>AppLocker Bypass - Weak Path Rules</image:title><image:caption>AppLocker Bypass - Weak Path Rules</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/applocker-default-rules.png</image:loc><image:title>AppLocker - Default Rules</image:title><image:caption>AppLocker - Default Rules</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/applocker-binary-planting-to-weak-folder.png</image:loc><image:title>AppLocker - Binary Planting to Weak Folder</image:title><image:caption>AppLocker - Binary Planting into Weak Folder</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/weak-permssions-in-windows-folder.png</image:loc><image:title>Weak Permssions in Windows Folder</image:title><image:caption>Weak Permissions n Windows Folder</image:caption></image:image><lastmod>2017-12-19T16:04:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/05/19/applocker-bypass-regasm-and-regsvcs/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/compile-the-csharp-code.png</image:loc><image:title>Compile the CSharp Code</image:title><image:caption>CSharp Code Compiled</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/regasm-executing-shellcode.png</image:loc><image:title>RegAsm - Executing ShellCode</image:title><image:caption>RegAsm - Executing Shellcode</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/regsvcs-executing-shellcode.png</image:loc><image:title>Regsvcs - Executing ShellCode</image:title><image:caption>Regsvcs - Executing Shellcode</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/msfvenom-generating-csharp-shellcode.png</image:loc><image:title>MsfVenom - Generating CSharp ShellCode</image:title><image:caption>MsfVenom - Generating CSharp ShellCode</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/meterpreter-regsvcs-and-regasm.png</image:loc><image:title>Meterpreter - Regsvcs and Regasm</image:title><image:caption>Meterpreter - Regsvcs and Regasm</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/strong-name-key-pair-generation.png</image:loc><image:title>Strong Name Key Pair Generation</image:title><image:caption>Strong Name Key Pair Generation</image:caption></image:image><lastmod>2017-05-19T07:36:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/05/11/applocker-bypass-regsvr32/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/applocker-restriction-of-script-execution.png</image:loc><image:title>AppLocker - Restriction of Script Execution</image:title><image:caption>AppLocker - Restriction of Script Execution</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/regsvr32-meterpreter.png</image:loc><image:title>Regsvr32 -Meterpreter</image:title><image:caption>Regsvr32 - Meterpreter</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/applocker-bypass-via-regsvr32.png</image:loc><image:title>AppLocker Bypass via Regsvr32</image:title><image:caption>AppLocker Bypass via Regsvr32</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/regsvr32-download-and-execution-of-the-scriptlet.png</image:loc><image:title>Regsvr32 - Download and Execution of the Scriptlet</image:title><image:caption>Regsvr32 - Download and Execution of the Scriptlet</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/applocker-script-rules.png</image:loc><image:title>AppLocker - Script Rules</image:title><image:caption>AppLocker - Script Rules</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/metasploit-applocker-bypass-via-regsvr32.png</image:loc><image:title>Metasploit - AppLocker Bypass via Regsvr32</image:title><image:caption>Metasploit - AppLocker Bypass via Regsvr32</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/metasploit-execute-the-payload.png</image:loc><image:title>Metasploit - Execute the Payload</image:title><image:caption>Metasploit - Execution of the Payload</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/metasploit-regsvr32-module.png</image:loc><image:title>Metasploit - Regsvr32 Module</image:title><image:caption>Metasploit - Regsvr32 Module</image:caption></image:image><lastmod>2017-05-19T09:26:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/05/08/applocker-bypass-installutil/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/applocker-bypass-execute-powershell-commands.png</image:loc><image:title>AppLocker Bypass - Execute PowerShell Commands</image:title><image:caption>AppLocker Bypass -  Execute PowerShell Commands</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/applocker-bypass-powershell-dll.png</image:loc><image:title>AppLocker Bypass - PowerShell DLL</image:title><image:caption>AppLocker Bypass - PowerShell DLL</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/applocker-bypass-powershell-version.png</image:loc><image:title>AppLocker Bypass - PowerShell Version</image:title><image:caption>AppLocker Bypass - PowerShell Version</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/applocker-bypass-powershell.png</image:loc><image:title>AppLocker Bypass - PowerShell</image:title><image:caption>AppLocker Bypass - PowerShell</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/applocker-bypass-compile-a-powershell-binary.png</image:loc><image:title>AppLocker Bypass - Compile a PowerShell Binary</image:title><image:caption>AppLocker Bypass - Compile a PowerShell Binary</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/powershell-blocked-by-applocker.png</image:loc><image:title>PowerShell Blocked by AppLocker</image:title><image:caption>PowerShell Blocked by AppLocker</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/metasploit-applocker-bypass.png</image:loc><image:title>Metasploit - AppLocker Bypass</image:title><image:caption>Metasploit - AppLocker Bypass</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/applocker-bypass-via-installutil-meterpreter-session.png</image:loc><image:title>AppLocker Bypass via InstallUtil - Meterpreter Session</image:title><image:caption>AppLocker Bypass - Meterpreter Session</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/bypass-applocker-manually.png</image:loc><image:title>Bypass AppLocker Manually</image:title><image:caption>Bypass AppLocker via InstallUtil</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/generation-of-c-file-with-shellcode.png</image:loc><image:title>Generation of C# File with Shellcode</image:title><image:caption>ShellCode inside C# File</image:caption></image:image><lastmod>2017-05-06T13:25:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/05/03/uac-bypass-task-scheduler/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/task-scheduler-elevated-meterpreter.png</image:loc><image:title>Task Scheduler - Elevated Meterpreter</image:title><image:caption>Task Scheduler - Elevated Meterpreter</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/windows-shortcut-schedule-task.png</image:loc><image:title>Windows Shortcut - Schedule Task</image:title><image:caption>Windows Shortcut - Schedule Task</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/task-scheduler-highest-privilege-option.png</image:loc><image:title>Task Scheduler - Highest Privilege Option</image:title><image:caption>Task Scheduler - High Privilege Option</image:caption></image:image><lastmod>2017-05-09T09:54:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/05/02/uac-bypass-event-viewer/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/pentestlab3-elevated-meterpreter.png</image:loc><image:title>Pentestlab3 - Elevated Meterpreter</image:title><image:caption>Pentestlab3 - Elevated Meterpreter</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/pentestlab3-high-integrity-process.png</image:loc><image:title>Pentestlab3 - High Integrity Process</image:title><image:caption>pentestlab3 - Running as High Integrity Process</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/custom-payload-registry.png</image:loc><image:title>Custom Payload - Registry</image:title><image:caption>Custom Payload - Registry</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/bypass-uac-via-event-viewer.png</image:loc><image:title>Bypass UAC via Event Viewer</image:title><image:caption>Bypass UAC via Event Viewer</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/modify-the-registry2.png</image:loc><image:title>Elevated CMD - Event Viewer Registry</image:title><image:caption>Elevated CMD via Event Viewer</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/event-viewer-via-mmc.png</image:loc><image:title>Event Viewer via MMC</image:title><image:caption>MMC and Event Viewer</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/event-viewer-process-high-integrity.png</image:loc><image:title>Event Viewer Process - High Integrity</image:title><image:caption>Event Viewer Process - High Integrity</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/metasploit-uac-bypass-via-event-viewer.png</image:loc><image:title>Metasploit - UAC Bypass via Event Viewer</image:title><image:caption>Metasploit - UAC Bypass via Event Viewer</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/05/uac-prevents-privilege-escalation.png</image:loc><image:title>UAC Prevents Privilege Escalation</image:title><image:caption>UAC Prevents Privilege Escalation</image:caption></image:image><lastmod>2021-02-01T19:49:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/04/24/windows-kernel-exploits/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/04/windows-exploit-suggester.png</image:loc><image:title>Windows Exploit Suggester</image:title><image:caption>Windows Exploit Suggester</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/04/sherlock-missing-patches-2.png</image:loc><image:title>Sherlock - Missing Patches 2</image:title><image:caption>Sherlock - Identification of Privilege Escalation Patches </image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/04/sherlock-missing-patches.png</image:loc><image:title>Sherlock - Missing Patches</image:title><image:caption>Sherlock - Missing Patches</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/04/metasploit-patches-enumeration.png</image:loc><image:title>Metasploit - Patches Enumeration</image:title><image:caption>Metasploit - Patches Enumeration</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/04/enumeration-of-installed-patches.png</image:loc><image:title>Enumeration of Installed Patches</image:title><image:caption>Enumeration of Installed Patches</image:caption></image:image><lastmod>2018-07-21T02:17:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/04/20/privilege-escalation-methods-poll/</loc><lastmod>2017-04-20T08:13:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/04/19/stored-credentials/</loc><lastmod>2024-01-12T02:01:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/04/13/hot-potato/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/04/hot-potato-powershell.png</image:loc><image:title>Hot Potato - PowerShell</image:title><image:caption>Hot Potato - PowerShell</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/04/hot-potato-capturing-the-payload.png</image:loc><image:title>Hot Potato - Capturing the Payload</image:title><image:caption>Hot Potato - Capturing the Metasploit Payload</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/04/hot-potato-privilege-escalation.png</image:loc><image:title>Hot Potato Privilege Escalation</image:title><image:caption>Hot Potato Privilege Escalation</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/04/hot-potato-triggered-via-shell.png</image:loc><image:title>Hot Potato Triggered via Shell</image:title><image:caption>Hot Potato Triggered</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/04/initiate-internet-explorer-via-cmd.png</image:loc><image:title>Initiate Internet Explorer via CMD</image:title><image:caption>Initiate Internet Explorer via CMD</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/04/metasploit-multi-handler-meterpreter.png</image:loc><image:title>Metasploit Multi Handler - Meterpreter</image:title><image:caption>Metasploit Multi Handler - 2nd Meterpreter Session</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/04/metasploit-executing-the-payload.png</image:loc><image:title>Metasploit - Executing the Payload</image:title><image:caption>Metasploit - Executing the Payload</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/04/hot-potato-and-metasploit-payload.png</image:loc><image:title>Hot Potato and Metasploit Payload</image:title><image:caption>Hot Potato and Metasploit Payload</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/04/hot-potato-pentestlab-user-added-to-local-admins.png</image:loc><image:title>Hot Potato - pentestlab user added to local admins</image:title><image:caption>pentestlab user added as local admin</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/04/hot-potato-attack-deployment-2.png</image:loc><image:title>Hot Potato - Attack Deployment 2</image:title><image:caption>Hot Potato - Attack Deployment 2</image:caption></image:image><lastmod>2017-04-13T12:25:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/04/07/secondary-logon-handle/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/04/ms16-032-custom-binary.png</image:loc><image:title>MS16-032 - Custom Binary</image:title><image:caption>MS16-032 Custom Binary</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/04/meterpreter-system-privileges.png</image:loc><image:title>Meterpreter - SYSTEM PrivilegesSecondary Logon Handle</image:title><image:caption>Meterpreter System Privileges</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/04/meterpreter-session-secondary-logon-handle.png</image:loc><image:title>Meterpreter Session - Secondary Logon Handle</image:title><image:caption>Meterpreter Session - Secondary Logon Handle </image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/04/ms16-032-elevated-command-prompt.png</image:loc><image:title>MS16-032 - Elevated Command Prompt</image:title><image:caption>MS16-032 - Elevated Command Prompt</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/04/powershell-ms16-032-elevated-command-prompt.png</image:loc><image:title>PowerShell - MS16-032 Elevated Command Prompt</image:title><image:caption>PowerShell - MS16-032 Elevated Command Prompt</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/04/powershell-secondary-logon-handle-script-operation.png</image:loc><image:title>PowerShell - Secondary Logon Handle Script Operation</image:title><image:caption>MS16-032 - PowerShell Script Operation</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/04/powershell-secondary-logon-handle-script.png</image:loc><image:title>PowerShell - Secondary Logon Handle Script</image:title><image:caption>PowerShell - Secondary Logon Handle Script</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/04/metasploit-secondary-logon-handle-module.png</image:loc><image:title>Metasploit - Secondary Logon Handle Module</image:title><image:caption>Metasploit - Secondary Logon Handle Module</image:caption></image:image><lastmod>2017-04-07T09:15:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/04/04/dll-injection/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/04/privilege-escalation-dll-injection.png</image:loc><image:title>Privilege Escalation - DLL Injection</image:title><image:caption>Privilege Escalation - DLL Injection</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/04/dll-executed-as-system.png</image:loc><image:title>DLL Executed as SYSTEM</image:title><image:caption>DLL Executed with SYSTEM Privileges</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/04/powersploit-dll-injection.png</image:loc><image:title>PowerSploit - DLL Injection</image:title><image:caption>PowerSploit - DLL Injection</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/04/identify-the-process-id.png</image:loc><image:title>Identify the Process ID</image:title><image:caption>Discovery of the Process ID</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/04/metasploit-reflective-dll-injection.png</image:loc><image:title>Metasploit - Reflective DLL Injection</image:title><image:caption>Metasploit - Reflective DLL Injection</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/04/metasploit-reflective-dll-injection-module.png</image:loc><image:title>Metasploit - Reflective DLL Injection Module</image:title><image:caption>Metasploit - Reflective DLL Injection Module</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/04/remotedllinjector-dll-injection.png</image:loc><image:title>RemoteDLLInjector - DLL Injection</image:title><image:caption>RemoteDLLInjector - DLL Injection Method</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/04/remotedllinjector-injecting-dll.png</image:loc><image:title>RemoteDLLInjector - Injecting DLL</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/04/metasploit-listener-configuration.png</image:loc><image:title>Metasploit Listener Configuration</image:title><image:caption>Metasploit Listener Configuration</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/04/generating-malicious-dll.png</image:loc><image:title>Generating Malicious DLL</image:title><image:caption>Msfvenom - DLL Generation </image:caption></image:image><lastmod>2018-08-01T09:52:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/04/03/token-manipulation/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/04/powersploit-token-manipulation.png</image:loc><image:title>PowerSploit - Token Manipulation</image:title><image:caption>PowerSploit - Token Manipulation</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/04/powersploit-token-enumeration.png</image:loc><image:title>PowerSploit - Token Enumeration</image:title><image:caption>PowerSploit -Token Enumeration</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/04/incognito-token-impersonation.png</image:loc><image:title>Incognito - Token Impersonation</image:title><image:caption>Incognito - Listing the available tokens</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/04/metasploit-token-impersonation.png</image:loc><image:title>Metasploit - Token Impersonation</image:title><image:caption>Metasploit - Token Impersonation</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/04/apache-service-running-as-administrator.png</image:loc><image:title>Apache Service Running as Administrator</image:title><image:caption>Apache Service Running as Administrator</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/04/privilege-escalation-rotten-potato.png</image:loc><image:title>Privilege Escalation - Rotten Potato</image:title><image:caption>Privilege Escalation - Rotten Potato</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/04/network-service-available-tokens.png</image:loc><image:title>Network Service Available Tokens</image:title><image:caption>Meterpreter - Available Tokens</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/04/apache-service-running-as-network-service.png</image:loc><image:title>Apache Service running as Network Service</image:title><image:caption>Apache Service running as Network Service</image:caption></image:image><lastmod>2017-04-04T15:15:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/03/31/insecure-registry-permissions/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/imagepath-registry-key.png</image:loc><image:title>ImagePath Registry Key</image:title><image:caption>ImagePath Registry Key</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/registry-image-path-modification.png</image:loc><image:title>Registry Image Path Modification</image:title><image:caption>Registry ImagePath Modification</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/privilege-escalation-via-insecure-registry-permissions.png</image:loc><image:title>Privilege Escalation via Insecure Registry Permissions</image:title><image:caption>Privilege Escalation via Insecure Registry Permissions </image:caption></image:image><lastmod>2017-03-31T08:10:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/03/30/weak-service-permissions/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/metasploit-system-via-service-binary-replacement.png</image:loc><image:title>Metasploit - System via Service Binary Replacement</image:title><image:caption>Metasploit - System via Service Binary Replacement</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/powersploit-execution-of-service-payload.png</image:loc><image:title>PowerSploit - Execution of Service Payload</image:title><image:caption>PowerSploit - Execution of Service Payload</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/restart-of-the-service.png</image:loc><image:title>Restart of the Service</image:title><image:caption>Restart of the Service</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/custom-service-planted-into-binary-path.png</image:loc><image:title>Custom Service Planted into Binary Path</image:title><image:caption>Custom Service Planted into Binary Path</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/powersploit-creating-the-custom-service.png</image:loc><image:title>PowerSploit Creating the Custom Service</image:title><image:caption>PowerSploit - Creating the Custom Service</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/powersploit-obtain-services-and-file-permissions.png</image:loc><image:title>PowerSploit - Obtain Services and File Permissions</image:title><image:caption>PowerSploit - Obtain Services and File Permissions</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/powersploit-backdoor-admnistrator-account.png</image:loc><image:title>PowerSploit - Backdoor Admnistrator Account</image:title><image:caption>PowerSploit - Backdoor Administrator Account</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/powersploit-abusing-the-binary-path.png</image:loc><image:title>PowerSploit - Abusing the Binary Path</image:title><image:caption>PowerSploit - Abusing the Binary Path</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/powersploit-list-modifiable-service.png</image:loc><image:title>PowerSploit - List Modifiable Services</image:title><image:caption>PowerSploit - List Services which the binary path can be modified</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/powersploit-service-details.png</image:loc><image:title>PowerSploit - Service Details</image:title><image:caption>PowerSploit - Service Details</image:caption></image:image><lastmod>2018-08-29T05:20:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/03/27/dll-hijacking/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/folder-permissions.png</image:loc><image:title>Folder-Permissions</image:title><image:caption>Identification of Weak Folder Permissions</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/malicious-dll-renamed-and-planted.png</image:loc><image:title>Malicious DLL Renamed and Planted</image:title><image:caption>Malicious DLL Renamed and Planted</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/process-with-missing-dll.png</image:loc><image:title>Process with Missing DLL</image:title><image:caption>Process with Missing DLL</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/procmon-filters.png</image:loc><image:title>Procmon Filters</image:title><image:caption>Procmon Filters to Check a Process for Missing DLL</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/generating-malicious-dll.png</image:loc><image:title>Generating Malicious DLL</image:title><image:caption>Generation of Malicious DLL</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/process-running-as-system.png</image:loc><image:title>Process Running as SYSTEM</image:title><image:caption>Process Running as SYSTEM</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/metasploit-privilege-escalation-via-dll-hijacking.png</image:loc><image:title>Metasploit - Privilege Escalation via DLL Hijacking</image:title><image:caption>Metasploit - Privilege Escalation via DLL Hijacking</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/powersploit-write-dll.png</image:loc><image:title>PowerSploit - Write DLL</image:title><image:caption>Write the DLL into the folder with weak permissions</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/powersploit-dicovery-of-paths-with-weak-permissions.png</image:loc><image:title>PowerSploit - Discovery of Paths with Weak Permissions</image:title><image:caption>Discovery of Folders with Modifiable Permissions </image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/powersploit-discovery-of-process-with-missing-dlls.png</image:loc><image:title>PowerSploit - Discovery of Process with Missing DLL's</image:title><image:caption>PowerSploit - Discovery of Process with Missing DLL's</image:caption></image:image><lastmod>2017-03-30T08:05:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/03/20/group-policy-preferences/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/psexec-authentication-as-admin.png</image:loc><image:title>PsExec - Authentication as Admin</image:title><image:caption>PsExec - Authentication as Administrator</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/metasploit-psexec.png</image:loc><image:title>Metasploit PsExec</image:title><image:caption>Metasploit PsExec Usage</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/decrypting-gpp-passwords-with-gp3finder.png</image:loc><image:title>Decrypting GPP Passwords with gp3finder</image:title><image:caption>Decrypting GPP Passwords Manually</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/gpp-cpassword-value.png</image:loc><image:title>GPP cPassword Value</image:title><image:caption>GPP cpassword Value</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/metasploit-gpp-exploitation.png</image:loc><image:title>Metasploit - GPP Exploitation</image:title><image:caption>Metasploit - Decrypting GPP Passwords</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/metasploit-powershell-payload.png</image:loc><image:title>Metasploit - PowerShell Payload</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/running-powersploit-via-metasploit.png</image:loc><image:title>Running PowerSploit via Metasploit</image:title><image:caption>Executing PowerSploit Modules via Metasploit</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/powersploit-get-cachedgpppassword.png</image:loc><image:title>PowerSploit - Get-CachedGPPPassword</image:title><image:caption>PowerSploit - Get-CachedGPPPassword</image:caption></image:image><lastmod>2017-03-23T20:52:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/03/13/injecting-metasploit-payloads-into-android-applications/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/manual-android-payload-generation.png</image:loc><image:title>Manual Android Payload Generation</image:title><image:caption>Manual Android Payload Generation</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/metasploit-multi-handler-android-payload.png</image:loc><image:title>Metasploit Multi Handler - Android Payload</image:title><image:caption>Metasploit - Handling Android Payloads</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/msfvenom-payload-injection.png</image:loc><image:title>MsfVenom Payload Injection</image:title><image:caption>MSFVenom - Payload Injection</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/android-post-exploitation-camera-snapshot.jpeg</image:loc><image:title>Android Post Exploitation - Camera Snapshot</image:title><image:caption>Android Post Exploitation - Camera Snapshot</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/android-post-exploitation.png</image:loc><image:title>Android Post Exploitation</image:title><image:caption>Android Post Exploitation</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/meterpreter-via-injected-apk.png</image:loc><image:title>Meterpreter via Injected APK</image:title><image:caption>Meterpreter via Malicious APK</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/apk-injector-building-the-inject-apk.png</image:loc><image:title>APK Injector - Building the Inject APK</image:title><image:caption>APK Injector - Building the injected APK</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/apk-injector.png</image:loc><image:title>APK Injector</image:title><image:caption>APK Injector - Decoding the APK</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/apk-wash.png</image:loc><image:title>APK Wash</image:title><image:caption>APK Wash - Antivirus Evasion</image:caption></image:image><lastmod>2021-09-06T06:39:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/03/09/unquoted-service-path/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/list-of-services.png</image:loc><image:title>List of Services</image:title><image:caption>Vulnerable Service Running as System</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/configuring-the-metasploit-listener.png</image:loc><image:title>Configuring the Metasploit Listener</image:title><image:caption>Configuring the Metasploit Listener</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/unquoted-service-path-privilege-escalation-to-system.png</image:loc><image:title>Unquoted Service Path - Privilege Escalation to System</image:title><image:caption>Execution of Payload and Escalation of Privileges to SYSTEM</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/restarting-the-vulnerable-service.png</image:loc><image:title>Restarting the Vulnerable Service</image:title><image:caption>Restarting the vulnerable service</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/metasploit-binary.png</image:loc><image:title>Metasploit Binary</image:title><image:caption>Replacing the original binary with the Metasploit payoad</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/unquoted-service-path-payload-generation.png</image:loc><image:title>Unquoted Service Path - Payload Generation</image:title><image:caption>Unquoted Service Path - Payload Generation </image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/privilege-escalation-via-metasploit-trusted-service-path.png</image:loc><image:title>Privilege Escalation via Metasploit Trusted Service Path</image:title><image:caption>Privilege Escalation via Metasploit Trusted Service Path</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/metasploit-configuring-the-trusted-service-path-module.png</image:loc><image:title>Metasploit - Configuring the Trusted Service Path Module</image:title><image:caption>Configuring the Trusted Service Path Metasploit Module</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/powersploit-local-admin-verification.png</image:loc><image:title>PowerSploit - Local Admin Verification</image:title><image:caption>Verification that the user has been created and added to the local admins group</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/03/powersploit-restart-the-service.png</image:loc><image:title>PowerSploit - Restart the Service</image:title><image:caption>PowerSploit - Restarting the Service</image:caption></image:image><lastmod>2018-11-26T21:10:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/02/28/always-install-elevated/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/02/capture3.png</image:loc><image:title>GPO-User - Always Install with elevated privileges</image:title><image:caption>GPO - Always Install with elevated privileges</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/02/capture0.png</image:loc><image:title>GPO-Always Install With Elevated Privileges</image:title><image:caption>GPO -Always Install With Elevated Privileges Setting</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/02/capture11.png</image:loc><image:title>Metasploit Module - Always-Install-Elevated</image:title><image:caption>Exploitation of Always Install Elevated with Metasploit </image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/02/capture6.png</image:loc><image:title>get-uid-shell-metasploit</image:title><image:caption>Meterpreter Session - Normal user</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/02/capture7.png</image:loc><image:title>registry-queries-always-install-elevated</image:title><image:caption>Query the registry to identify the issue</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/02/capture15.png</image:loc><image:title>net-localgroup-administrators</image:title><image:caption>Verification that the "backdoor" user has been created</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/02/capture14.png</image:loc><image:title>User-Add - Adding an Account as Local Admin</image:title><image:caption>Adding an account into Administrators group</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/02/capture13.png</image:loc><image:title>PowerSploit - Always Install Elevated</image:title><image:caption>PowerSploit - Always Install Elevated</image:caption></image:image><lastmod>2017-03-30T08:14:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/02/12/android-webview-vulnerabilities/</loc><lastmod>2017-02-13T11:56:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/02/06/reverse-engineering-android-applications/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/02/dexdump-dalvik-instructions.png</image:loc><image:title>dexdump-dalvik-instructions</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/02/jadx-gui.png</image:loc><image:title>jadx-gui</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/02/reverse-engineering-dex.png</image:loc><image:title>reverse-engineering-dex</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/02/baksmali-dex.png</image:loc><image:title>baksmali-dex</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/02/aapt-decompile-apk-files.png</image:loc><image:title>aapt-decompile-apk-files</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/02/axmlprinter-manifest.png</image:loc><image:title>axmlprinter-manifest</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/02/aapt-dump-permissions.png</image:loc><image:title>aapt-dump-permissions</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/02/aapt-manifest-file.png</image:loc><image:title>aapt-manifest-file</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/02/android-reversing.jpg</image:loc><image:title>android-reversing</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/02/mobsf-java-source-code.png</image:loc><image:title>mobsf-java-source-code</image:title></image:image><lastmod>2017-03-30T08:15:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/01/30/retrieving-apk-files/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/01/apk-leecher.png</image:loc><image:title>apk-leecher</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/01/drozer-location-apk.png</image:loc><image:title>drozer-location-apk</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/01/adb-discover-app-path.png</image:loc><image:title>adb-discover-app-path</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/01/android-list-packages.png</image:loc><image:title>android-list-packages</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/01/apk-download1.png</image:loc><image:title>apk-download1</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2017/01/android-reversing.jpg</image:loc><image:title>android-reversing</image:title></image:image><lastmod>2017-01-30T10:12:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2017/01/24/security-guidelines-for-android-manifest-files/</loc><lastmod>2017-01-24T03:48:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2016/11/07/list-of-vulnerable-android-applications/</loc><lastmod>2017-04-18T17:14:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2016/11/02/hardware-kit-for-infrastructure-assessments/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2016/11/usb-eth.jpg</image:loc><image:title>usb-eth</image:title><image:caption>USB Ethernet Card</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2016/11/screwdrivers.jpg</image:loc><image:title>screwdrivers</image:title><image:caption>Screwdrivers</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2016/11/usb32000spt-main.jpg</image:loc><image:title>usb32000spt-main</image:title><image:caption>USB Ethernet Switch</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2016/11/network_cable__350_mhz__cat_5e.jpg</image:loc><image:title>network_cable__350_mhz__cat_5e</image:title><image:caption>Ethernet Cable</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2016/11/rj45-end-to-end-ethernet-cable-double-joint-connector-2-10-computer-accessories.jpg</image:loc><image:title>rj45-end-to-end-ethernet-cable-double-joint-connector-2-10-computer-accessories</image:title><image:caption>Ethernet Cable Connector</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2016/11/flash.jpg</image:loc><image:title>flash</image:title><image:caption>USB Flash Drives</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2016/11/iec.jpg</image:loc><image:title>iec</image:title><image:caption>IEC Adapter</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2016/11/camera-protector.png</image:loc><image:title>camera-protector</image:title><image:caption>Web Cam Protector</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2016/11/alfa-network-usb-wifi-card-awus036nha-1000-mw-and-5-dbi-antenna-jpg.png</image:loc><image:title>alfa-network-usb-wifi-card-awus036nha-1000-mw-and-5-dbi-antenna-jpg</image:title><image:caption>Alfa USB Wifi Card</image:caption></image:image><lastmod>2016-11-03T15:15:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2016/09/30/voip-default-password-list/</loc><lastmod>2016-10-01T07:34:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2016/09/18/voip-checklist-for-penetration-testers/</loc><lastmod>2017-09-14T12:56:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2015/02/01/pre-engagement-pentest-checklist-for-web-applications-assessments/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2015/02/19-checklist-recruitment11.jpg</image:loc><image:title>Checklist</image:title></image:image><lastmod>2015-02-09T13:30:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2015/02/03/hirte-attack/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2015/02/10.png</image:loc><image:title>WEP Key Cracked</image:title><image:caption>WEP Key Found</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2015/02/7.png</image:loc><image:title>Packets-Hirte</image:title><image:caption>Read the packets</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2015/02/9.png</image:loc><image:title>Hirte Attack</image:title><image:caption>Hirte Attack Running</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2015/02/12.png</image:loc><image:title>Fake Wireless Network - Windows</image:title><image:caption>Victim - Fake Wireless Network Available </image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2015/02/41.png</image:loc><image:title>fake wireless AP</image:title><image:caption>Rogue Wireless Network</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2015/02/11.png</image:loc><image:title>airodump-ng packet capturing</image:title><image:caption>Initiate Packet Capturing</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2015/02/3.png</image:loc><image:title>airbase-fake-access-point</image:title><image:caption>Creation of Fake Access Point</image:caption></image:image><lastmod>2016-03-30T19:29:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2015/02/02/profiling-passwords/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2015/02/5.png</image:loc><image:title>Wyd-Password List</image:title><image:caption>Contents of Password List</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2015/02/6.png</image:loc><image:title>Password List Content</image:title><image:caption>View the contents of the Password List</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2015/02/4.png</image:loc><image:title>Wyd Password Generation</image:title><image:caption>Running Wyd tool to generate passwords</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2015/02/1.png</image:loc><image:title>wget</image:title><image:caption>Downloading Web Content of the Target Site</image:caption></image:image><lastmod>2015-02-02T18:52:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2015/01/31/uncovering-hidden-ssids/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2015/01/6.png</image:loc><image:title>Probe Response</image:title><image:caption>Generation of Probe Response Packets </image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2015/01/4.png</image:loc><image:title>deuathentication attack</image:title><image:caption>Sending deuathentication packets</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2015/01/3.png</image:loc><image:title>Probe response packet</image:title><image:caption>Probe Response Packet contains the SSID</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2015/01/7.png</image:loc><image:title>Hidden Wireless Network</image:title><image:caption>Hidden Wireless Network</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2015/01/1.png</image:loc><image:title>Hidden Wireless SSID</image:title><image:caption>Beacon Frames - Hidden Wireless SSID</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2015/01/2.png</image:loc><image:title>Enable Monitor Mode Interface</image:title><image:caption>Enable Monitor Mode Interface</image:caption></image:image><lastmod>2021-05-01T07:27:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2014/07/22/eavesdropping-voip-calls-with-wireshark/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2014/07/decoding_rtp_traffic-wireshark.png</image:loc><image:title>Decoding_RTP_Traffic-Wireshark</image:title><image:caption>Decoding RTP Traffic-Wireshark</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2014/07/rtp_traffic.png</image:loc><image:title>RTP_Traffic</image:title><image:caption>RTP Traffic </image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2014/07/arpsoof-mitm.png</image:loc><image:title>Arpsoof-Mitm</image:title><image:caption>MiTM attack</image:caption></image:image><lastmod>2016-09-20T14:59:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2014/07/14/caller-id-spoofing/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2014/07/spoofed_id_inviteflood.png</image:loc><image:title>Spoofed_ID_Inviteflood</image:title><image:caption>Spoofed Call with the ID of CEO</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2014/07/metasploit_has_you.png</image:loc><image:title>metasploit_has_you</image:title><image:caption>Spoofed Caller ID - Metasploit</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2014/07/metasploit_invite_spoof.png</image:loc><image:title>metasploit_invite_spoof</image:title><image:caption>Fake INVITE - Metasploit</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2014/07/caller_id_spoofing_inviteflood.png</image:loc><image:title>caller_id_spoofing_inviteflood</image:title><image:caption>Caller ID Spoofing - Inviteflood</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2014/07/pentestlab_rocks.png</image:loc><image:title>pentestlab_rocks</image:title><image:caption>Spoofed Call - Viproy</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2014/07/viproy_spoofed_caller_id.png</image:loc><image:title>viproy_spoofed_caller_id</image:title><image:caption>Spoofing the Caller ID with Viproy</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2014/07/spoofed_packet.png</image:loc><image:title>spoofed_packet</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2014/07/spoofed_call_scenario.jpg</image:loc><image:title>Spoofed_Call_Scenario</image:title><image:caption>Scenario</image:caption></image:image><lastmod>2014-07-15T23:15:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2014/04/07/phishing-frenzy/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2014/04/templates.png</image:loc><image:title>templates</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2014/04/phishing_options.png</image:loc><image:title>phishing_options</image:title><image:caption>Phishing Options</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2014/04/create_campaign.png</image:loc><image:title>phishing-frenzy</image:title><image:caption>phishing frenzy - campaign</image:caption></image:image><lastmod>2014-04-07T00:56:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2013/06/26/html-injection/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/06/capture-credentials.png</image:loc><image:title>capture credentials</image:title><image:caption>Credentials</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/06/fake-login.png</image:loc><image:title>fake login</image:title><image:caption>Fake Login Form</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/06/html1.png</image:loc><image:title>HTML - Fake Login Code</image:title><image:caption>Injecting HTML Code - Fake Login</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/06/capture-page.png</image:loc><image:title>capture page</image:title><image:caption>Mutillidae - Data Capture Page</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/06/html.png</image:loc><image:title>Vulnerable Form</image:title><image:caption>Vulnerable Form</image:caption></image:image><lastmod>2020-02-13T21:24:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2013/05/06/findmyhash/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/05/screenshot.png</image:loc><image:title>FindMyHash Script</image:title><image:caption>FindMyHash Script in action</image:caption></image:image><lastmod>2014-07-17T16:15:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2013/04/21/pen-testing-sql-servers-with-nmap/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/04/screenshot-4.png</image:loc><image:title>sql dump hashes </image:title><image:caption>Dump MS-SQL hashes - Nmap</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/04/screenshot-3.png</image:loc><image:title>Run OS Commands via xp_cmdshell - Nmap</image:title><image:caption>Run net users via xp_cmdshell - Nmap</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/04/screenshot-2.png</image:loc><image:title>xp_cmdshell - Nmap</image:title><image:caption>Run OS command via xp_cmdshell - Nmap</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/04/screenshot-11.png</image:loc><image:title>List Tables - Nmap</image:title><image:caption>List Tables - Nmap</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/04/screenshot2.png</image:loc><image:title>Nmap -db access</image:title><image:caption>Discover which user has access to which db - Nmap</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/04/screenshot-1.png</image:loc><image:title>Nmap - SQL Null</image:title><image:caption>Check For Null passwords on SA accounts - Nmap</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/04/screenshot1.png</image:loc><image:title>MS-SQL Brute Nmap</image:title><image:caption>Brute Force Weak MS-SQL Accounts - Nmap</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/04/screenshot.png</image:loc><image:title>Nmap - MS -SQL Info</image:title><image:caption>Obtain SQL Information - Nmap</image:caption></image:image><lastmod>2013-07-08T00:09:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2013/03/28/dumpster-diving/</loc><lastmod>2013-05-02T00:07:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2013/03/25/dumping-clear-text-credentials-with-mimikatz/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/03/mimikatz3.png</image:loc><image:title>mimikatz3</image:title><image:caption>Obtaining the credentials</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/03/mimikatz2.png</image:loc><image:title>mimikatz2</image:title><image:caption>Obtaining the credentials</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/03/mimikatz-1.png</image:loc><image:title>Executing Mimikatz</image:title><image:caption>Executing Mimikatz</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/03/directory.png</image:loc><image:title>Directory</image:title><image:caption>Mimikatz on C: Directory</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/03/going-into-the-mimikatz.png</image:loc><image:title>Going into the mimikatz</image:title><image:caption>Locating the Mimikatz</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/03/uploading-mimikatz.png</image:loc><image:title>uploading mimikatz</image:title><image:caption>Uploading Mimikatz on the remote system</image:caption></image:image><lastmod>2018-07-09T19:49:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/resources/presentations/tools/</loc><lastmod>2013-03-23T20:03:19+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://pentestlab.blog/2013/03/18/penetration-testing-sql-servers/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/03/sql.png</image:loc><image:title>SQL Command Execution</image:title><image:caption>Executing Database Commands</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/03/cmd.png</image:loc><image:title>xp_cmdshell </image:title><image:caption>xp_cmdshell - Metasploit</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/03/enum3.png</image:loc><image:title>enum3</image:title><image:caption>MS-SQL Enumeration 3</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/03/enum2.png</image:loc><image:title>Enum2</image:title><image:caption>MS-SQL Enum 2</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/03/enumeration.png</image:loc><image:title>Enumeration MS-SQL</image:title><image:caption>MS-SQL Enumeration</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/03/mslogin.png</image:loc><image:title>SQL Brute Force Passwords</image:title><image:caption>Brute Forcing MS SQL Passwords with Metasploit</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/03/screenshot-3.png</image:loc><image:title>Metasploit - mssql ping</image:title><image:caption>Metasploit - mssql ping</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/03/screenshot-2.png</image:loc><image:title>SQL Server Discovery - Nmap</image:title><image:caption>SQL Server Discovery - Nmap</image:caption></image:image><lastmod>2013-06-11T05:47:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2013/03/10/discovering-oracle-accounts-with-nmap/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/03/3.png</image:loc><image:title>Discovering Oracle Accounts</image:title><image:caption>Discovering Oracle Accounts</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/03/2.png</image:loc><image:title>Brute Forcing Oracle SID's - Nmap</image:title><image:caption>Brute Forcing Oracle SID's - Nmap</image:caption></image:image><lastmod>2013-08-14T16:54:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2013/02/25/common-virtualization-vulnerabilities-and-how-to-mitigate-risks/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/02/virtualization.gif</image:loc><image:title>Virtualization</image:title></image:image><lastmod>2013-02-25T22:26:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2013/02/25/sql-injection-authentication-bypass-with-burp/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/02/bypass-authentication-5.png</image:loc><image:title>Bypass Authentication 5</image:title><image:caption>Bypass Authentication by passing the correct payload</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/02/bypass-authentication-4.png</image:loc><image:title>Bypass Authentication 4</image:title><image:caption>SQL Injection Bypass Authentication - Burp payloads</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/02/bypass-authentication-3.png</image:loc><image:title>Bypass Authentication 3</image:title><image:caption>Burp Intruder - Setting up the payloads</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/02/bypass-authentication-2.png</image:loc><image:title>Bypass Authentication 2</image:title><image:caption>Burp Intruder - Attack Type and Position</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/02/bypass-authentication-6.png</image:loc><image:title>Bypass Authentication - SQL Injection</image:title><image:caption>SQL Injection Error </image:caption></image:image><lastmod>2013-02-25T13:37:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2013/02/20/extracting-metada-from-files/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/02/metadata-foca.png</image:loc><image:title>metadata-foca</image:title><image:caption>FOCA - Metadata</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/02/doc2.png</image:loc><image:title>doc2</image:title><image:caption>Metadata of a doc file 2</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/02/doc.png</image:loc><image:title>Metadata - doc</image:title><image:caption>Metadata of a doc file</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/02/image.png</image:loc><image:title>exiftool-metadata</image:title><image:caption>Extracting metadata of an image - exiftool</image:caption></image:image><lastmod>2014-02-07T22:11:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2013/02/17/metasploit-storing-pen-test-results/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/02/export.png</image:loc><image:title>export-metasploit-db</image:title><image:caption>Export Results From Metasploit Database</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/02/services.png</image:loc><image:title>services-metasploit</image:title><image:caption>List Services - Metasploit Database</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/02/hosts.png</image:loc><image:title>hosts-metasploit</image:title><image:caption>List Hosts - Metasploit Database</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/02/nmap-scan.png</image:loc><image:title>nmap scan-metasploit</image:title><image:caption>Metasploit - Nmap Scan</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/02/database-commands.png</image:loc><image:title>Metasploit database commands</image:title><image:caption>Metasploit - Database Commands</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/02/metasploit-databases.png</image:loc><image:title>metasploit-databases</image:title><image:caption>Databasse Settings</image:caption></image:image><lastmod>2013-02-17T13:46:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2013/02/16/information-gathering-with-nmap/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/02/reverseip.png</image:loc><image:title>reverseIP</image:title><image:caption>Nmap - Reverse IP </image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/02/dnsbrute.png</image:loc><image:title>dnsbrute-nmap</image:title><image:caption>Nmap - Brute Forcing DNS</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/02/email.png</image:loc><image:title>email-nmap</image:title><image:caption>Nmap - Discover Email Accounts</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/02/whois.png</image:loc><image:title>whois-nmap</image:title><image:caption>Nmap - Whois</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/02/ipgeolocation.png</image:loc><image:title>ipgeolocation</image:title><image:caption>Nmap - IP Geolocation</image:caption></image:image><lastmod>2013-02-28T17:44:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2013/02/03/pentbox/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/02/6.png</image:loc><image:title>HTTP Directory BruteForce</image:title><image:caption>Directory Brute Force - PenTBox</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/02/4.png</image:loc><image:title>DNS &amp; Host Gathering</image:title><image:caption>DNS &amp; Host Gathering - PenTBox</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/02/3.png</image:loc><image:title>PenTBox - TCP Port Scanner</image:title><image:caption>PenTBox - TCP Port Scanner</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/02/2.png</image:loc><image:title>PenTBox - Hash Cracker</image:title><image:caption>Hash Cracker Module - PenTBox</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/1.png</image:loc><image:title>PenTBox - Base64</image:title><image:caption>Base64 Encoder-Decoder</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/pentbox.png</image:loc><image:title>pentbox</image:title><image:caption>pentbox - Menu</image:caption></image:image><lastmod>2013-02-17T13:36:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2013/01/31/discover-contacts-and-domains-with-recon-ng/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/report1.png</image:loc><image:title>recon-ng report</image:title><image:caption>recon-ng report 2</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/report.png</image:loc><image:title>Report</image:title><image:caption>recon-ng - Report</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/recon6.png</image:loc><image:title>recon6</image:title><image:caption>Save the results in HTML file</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/screenshot-at-2013-01-30-233316.png</image:loc><image:title>recon-ng 5</image:title><image:caption>Discovering subdomain with recon-ng</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/recon5.png</image:loc><image:title>recon5</image:title><image:caption>discover hosts via google</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/recon4.png</image:loc><image:title>recon4</image:title><image:caption>Gathering Contacts</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/recon3.png</image:loc><image:title>recon3</image:title><image:caption>load jigsaw module</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/recon2.png</image:loc><image:title>recon2</image:title><image:caption>recon-ng - sample of the available modules</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/recon.png</image:loc><image:title>recon-ng</image:title><image:caption>recon-ng - commands</image:caption></image:image><lastmod>2013-01-31T10:51:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2013/01/27/physical-penetration-testing-toolkit/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/screenshot-at-2013-01-27-005215.png</image:loc><image:title>Get Out of jail template</image:title><image:caption>Get Out Of Jail Template</image:caption></image:image><lastmod>2013-01-31T22:13:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2013/01/22/using-timestomp-to-change-the-mace-values-of-a-file/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/mace5.jpeg</image:loc><image:title>MACE5</image:title><image:caption>Verify the MACE changes</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/mace4.jpeg</image:loc><image:title>MACE4</image:title><image:caption>Changing the MACE values</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/mace3.jpeg</image:loc><image:title>MACE3</image:title><image:caption>Changing the MACE values</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/mace2.jpeg</image:loc><image:title>MACE2</image:title><image:caption>Display MACE values</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/mace1.jpeg</image:loc><image:title>MACE1</image:title><image:caption>timestomp - help banner</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/mace.jpeg</image:loc><image:title>MACE Attributes </image:title><image:caption>MACE Attributes - Doc</image:caption></image:image><lastmod>2013-01-22T01:08:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2013/01/20/nfs-misconfiguration/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/xss-stored23.jpeg</image:loc><image:title>/etc/shadow</image:title><image:caption>Contents of /etc/shadow</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/xss-stored22.jpeg</image:loc><image:title>/etc/passwd</image:title><image:caption>Contents of /etc/passwd</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/xss-stored21.jpeg</image:loc><image:title>df -h</image:title><image:caption>Display the mount folder</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/xss-stored20.jpeg</image:loc><image:title>Contents of root directory</image:title><image:caption>Contents of root directory</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/xss-stored19.jpeg</image:loc><image:title>mount share directory</image:title><image:caption>mount share directory</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/xss-stored18.jpeg</image:loc><image:title>showmount </image:title><image:caption>Export NFS shares</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/xss-stored17.jpeg</image:loc><image:title>XSS-Stored17</image:title><image:caption>NFS port is open</image:caption></image:image><lastmod>2013-01-24T14:39:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2013/01/16/sql-brute-force-script/</loc><lastmod>2013-01-16T01:51:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2013/01/15/stored-xss-and-set/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/xss-stored2.jpeg</image:loc><image:title>XSS-Stored2</image:title><image:caption>Alert Box - JavaScript Code</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/xss-stored1.jpeg</image:loc><image:title>XSS-Stored1</image:title><image:caption>Malicious Java Applet</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/xss-stored.jpeg</image:loc><image:title>XSS-Stored</image:title><image:caption>Fake message trying to convince the user to run the java applet</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/stored-xss6.jpeg</image:loc><image:title>Stored-XSS6</image:title><image:caption>Malicious JavaScript Code</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/stored-xss5.jpeg</image:loc><image:title>Stored-XSS5</image:title><image:caption>SET - Encoders</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/stored-xss4.jpeg</image:loc><image:title>Stored-XSS4</image:title><image:caption>SET Configurations</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/stored-xss3.jpeg</image:loc><image:title>Stored-XSS3</image:title><image:caption>Java Applet Attack Method</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/stored-xss2.jpeg</image:loc><image:title>Stored-XSS2</image:title><image:caption>SET - Menu</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/stored-xss1.jpeg</image:loc><image:title>Stored-XSS1</image:title><image:caption>Comment Field vulnerable to XSS</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/stored-xss.jpeg</image:loc><image:title>Stored-XSS</image:title><image:caption>Comment Form Vulnerable to XSS</image:caption></image:image><lastmod>2013-01-16T17:19:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2013/01/13/detecting-web-application-firewalls/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/waf-cookies6.jpeg</image:loc><image:title>WAF - Imperva</image:title><image:caption>Detection of Imperva WAF</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/waf-cookies5.jpeg</image:loc><image:title>WAF-Nmap</image:title><image:caption>WAF detection via Nmap</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/waf-cookies4.jpeg</image:loc><image:title>WAFW00F</image:title><image:caption>Detection of WAF with wafwoof</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/waf-cookies3.jpeg</image:loc><image:title>WAF-Session Expired</image:title><image:caption>WAF - Session Expired</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/waf-cookies1.jpeg</image:loc><image:title>WAF-Server Response</image:title><image:caption>Indication of WAF via HTTP response</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/waf-cookies.jpeg</image:loc><image:title>WAF-Cookies</image:title><image:caption>WAF Discovery Via Cookies</image:caption></image:image><lastmod>2013-03-28T18:52:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2013/01/09/building-a-penetration-testing-lab-cluster/</loc><lastmod>2013-01-09T11:47:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2013/01/08/professional-and-ethical-standards/</loc><lastmod>2013-01-09T15:59:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2013/01/07/windows-tools-for-penetration-testing/</loc><lastmod>2014-07-14T12:02:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2013/01/05/dns-results-from-netcraft-search-engine/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/netcraftdns.jpeg</image:loc><image:title>netcraftdns</image:title><image:caption>netcraftdns - Sample Results</image:caption></image:image><lastmod>2013-03-21T07:27:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2013/01/04/post-exploitation-in-linux-with-metasploit/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/linux-post-exploitation12.jpeg</image:loc><image:title>Linux - Post Exploitation12</image:title><image:caption>Last Logs</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/linux-post-exploitation11.jpeg</image:loc><image:title>Linux - Post Exploitation11</image:title><image:caption>Gathering User History Information</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/linux-post-exploitation10.jpeg</image:loc><image:title>Linux - Post Exploitation10</image:title><image:caption>Enumerating the system</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/linux-post-exploitation9.jpeg</image:loc><image:title>Linux - Post Exploitation9</image:title><image:caption>Enumerating Protections</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/linux-post-exploitation7.jpeg</image:loc><image:title>Linux - Post Exploitation7</image:title><image:caption>Enumerating network information</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/linux-post-exploitation6.jpeg</image:loc><image:title>Linux - Post Exploitation6</image:title><image:caption>Opening the conf files</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/linux-post-exploitation5.jpeg</image:loc><image:title>Linux - Post Exploitation5</image:title><image:caption>Sample of Configuration files obtained</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/linux-post-exploitation4.jpeg</image:loc><image:title>Linux - Post Exploitation4</image:title><image:caption>Virtual machine discovery</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/linux-post-exploitation3.jpeg</image:loc><image:title>Linux - Post Exploitation3</image:title><image:caption>Collecting Password Hashes</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2013/01/linux-post-exploitation2.jpeg</image:loc><image:title>Linux - Post Exploitation2</image:title><image:caption>Configuring the hasdump module</image:caption></image:image><lastmod>2013-01-31T01:56:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/12/26/local-file-inclusion-exploitation-with-burp/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/file-inclusion11.jpeg</image:loc><image:title>File-Inclusion11</image:title><image:caption>/proc/cmdline contents</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/file-inclusion10.jpeg</image:loc><image:title>File-Inclusion10</image:title><image:caption>p</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/file-inclusion12.jpeg</image:loc><image:title>File-Inclusion12</image:title><image:caption>environment</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/file-inclusion14.jpeg</image:loc><image:title>File-Inclusion14</image:title><image:caption>mysql configuration file</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/file-inclusion8.jpeg</image:loc><image:title>File-Inclusion8</image:title><image:caption>/etc/issue contents</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/file-inclusion7.jpeg</image:loc><image:title>File-Inclusion7</image:title><image:caption>motd</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/file-inclusion6.jpeg</image:loc><image:title>File-Inclusion6</image:title><image:caption>etc/hosts contents</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/file-inclusion5.jpeg</image:loc><image:title>File-Inclusion5</image:title><image:caption>/etc/group contents</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/file-inclusion4.jpeg</image:loc><image:title>File-Inclusion4</image:title><image:caption>Reading the /etc/passwd</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/file-inclusion3.jpeg</image:loc><image:title>File-Inclusion3</image:title><image:caption>HTTP Request Modification - /etc/passwd</image:caption></image:image><lastmod>2013-01-07T00:37:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/12/24/sql-injection-authentication-bypass-cheat-sheet/</loc><lastmod>2023-06-30T07:43:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/12/23/file-upload-exploitation/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/upload6.jpeg</image:loc><image:title>upload6</image:title><image:caption>Dump of DVWA database 2</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/upload5.jpeg</image:loc><image:title>upload5</image:title><image:caption>Dump of DVWA database</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/upload4.jpeg</image:loc><image:title>upload4</image:title><image:caption>Dumping the database to a file</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/upload3.jpeg</image:loc><image:title>upload3</image:title><image:caption>Listing Directories</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/upload2.jpeg</image:loc><image:title>upload - shell</image:title><image:caption>Obtaining a shell</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/upload1.jpeg</image:loc><image:title>web shell upload</image:title><image:caption>uploading the web shell</image:caption></image:image><lastmod>2012-12-23T04:21:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/12/22/arp-poisoning-script/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/arp.jpeg</image:loc><image:title>arp poison script</image:title><image:caption>ARP poison script</image:caption></image:image><lastmod>2017-02-17T17:53:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/12/21/brute-force-attack-with-burp/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/bruteforce8.jpeg</image:loc><image:title>BruteForce8</image:title><image:caption>Access in the admin area</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/bruteforce7.jpeg</image:loc><image:title>brute force 7</image:title><image:caption>Discovery of valid credentials</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/bruteforce6.jpeg</image:loc><image:title>Cluster Bomb - Intruder</image:title><image:caption>Cluster Bomb - Intruder</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/bruteforce5.jpeg</image:loc><image:title>BruteForce5</image:title><image:caption>Payload Set 3 - Login</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/bruteforce4.jpeg</image:loc><image:title>BruteForce4</image:title><image:caption>Payload Set 2 - Passwords</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/bruteforce3.jpeg</image:loc><image:title>BruteForce3</image:title><image:caption>Payload Set 1 - Usernames</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/bruteforce2.jpeg</image:loc><image:title>Clearing Position </image:title><image:caption>Clearing Positions</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/bruteforce1.jpeg</image:loc><image:title>HTTP Requst - DVWA</image:title><image:caption>Capturing the HTTP Request</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/bruteforce.jpeg</image:loc><image:title>BruteForce - Login Form</image:title><image:caption>Login Form</image:caption></image:image><lastmod>2013-01-13T21:56:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/12/20/http-methods-identification/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/lazymap4.jpeg</image:loc><image:title>HTTP Methods Identfication</image:title><image:caption>Source Code</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/lazymap3.jpeg</image:loc><image:title>Web Server Methods Identification</image:title><image:caption>Demonstration</image:caption></image:image><lastmod>2013-01-14T09:58:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/12/19/command-execution-dvwa/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/commandexecution10.jpeg</image:loc><image:title>connect with netcat</image:title><image:caption>connect with netcat</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/commandexecution8.jpeg</image:loc><image:title>Command Execution Vulnerable Source Code</image:title><image:caption>Vulnerable Source Code</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/commandexecution7.jpeg</image:loc><image:title>command execution - etc/passwd</image:title><image:caption>Contents of /etc/passwd</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/commandexecution6.jpeg</image:loc><image:title>user groups - command execution</image:title><image:caption>user groups</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/commandexecution5.jpeg</image:loc><image:title>Execution of multiple commands - dvwa</image:title><image:caption>Execution of multiple commands 2</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/commandexecution4.jpeg</image:loc><image:title>DVWA - execution of multiple commands</image:title><image:caption>execution of multiple commands</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/commandexecution3.jpeg</image:loc><image:title>ls command - command execution</image:title><image:caption>Contents of the current directory</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/commandexecution1.jpeg</image:loc><image:title>Testing for command execution</image:title><image:caption>Testing for command execution</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/commandexecution.jpeg</image:loc><image:title>ping utility - DVWA</image:title><image:caption>ping utility - DVWA</image:caption></image:image><lastmod>2016-12-05T22:06:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/12/17/post-exploitation-discovering-network-information-in-windows/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/postexploitation41.jpeg</image:loc><image:title>Active Connections - netstat -nao</image:title><image:caption>Active Connections</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/postexploitation31.jpeg</image:loc><image:title>net view - Discover Hosts on the same workgroup</image:title><image:caption>Discover Hosts on the same workgroup</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/postexploitation21.jpeg</image:loc><image:title>network diagnostic</image:title><image:caption>network diagnostic</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/postexploitation4.jpeg</image:loc><image:title>System shares - net share</image:title><image:caption>System Shares</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/postexploitation3.jpeg</image:loc><image:title>ARP Table - arp -a</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/postexploitation2.jpeg</image:loc><image:title>Routing Table - route print</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/postexploitation1.jpeg</image:loc><image:title>Display Local DNS Cache</image:title><image:caption>Display Local DNS Cache</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/postexploitation.jpeg</image:loc><image:title>ipconfig /all</image:title><image:caption>ipconfig /all</image:caption></image:image><lastmod>2012-12-24T17:37:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/12/10/automater/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/automater2.jpeg</image:loc><image:title>automater - URL Expansion</image:title><image:caption>URL Expansion</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/automater1.jpeg</image:loc><image:title>automater - URL</image:title><image:caption>Running Automater against a URL</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/automater.jpeg</image:loc><image:title>automater - Description</image:title><image:caption>Description of Automater</image:caption></image:image><lastmod>2012-12-11T18:01:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/11/24/owning-the-database-with-sqlmap/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/11/sqlmap8.jpeg</image:loc><image:title>sqlmap - cracking hashes</image:title><image:caption>Cracking hashes in table users</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/11/sqlmap7.jpeg</image:loc><image:title>sqlmap - guestbook</image:title><image:caption>Guestbook - Tables Entries</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/11/sqlmap6.jpeg</image:loc><image:title>sqlmap - Obtaining the columns</image:title><image:caption>Obtaining the columns</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/11/sqlmap4.jpeg</image:loc><image:title>sqlmap - Database tables</image:title><image:caption>Database tables</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/11/sqlmap31.jpeg</image:loc><image:title>sqlmap - Privileges and Roles</image:title><image:caption>Discover Privileges and Roles</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/11/sqlmap21.jpeg</image:loc><image:title>sqlmap - Discover database users and hashes</image:title><image:caption>Discover database users and hashes</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/11/sqlmap13.jpeg</image:loc><image:title>sqlmap1</image:title><image:caption>Obtaining the current user,current db,hostname and if the current user is dba</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/11/sqlmap12.jpeg</image:loc><image:title>sqlmap1 - Obtaining current user,current database and checking if current user is DBA</image:title><image:caption>Obtaining current user,current database and checking if current user is DBA</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/11/sqlmap3.jpeg</image:loc><image:title>sqlmap - Retrieving the database banner</image:title><image:caption>Retrieving the database banner</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/11/sqlmap2.jpeg</image:loc><image:title>Fingerprinting the database - sqlmap</image:title><image:caption>Fingerprinting the database</image:caption></image:image><lastmod>2018-05-24T07:30:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/12/06/scanning-web-servers-with-nikto/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/nikto3.jpeg</image:loc><image:title>nikto - opening the config file</image:title><image:caption>Discover credentials on the config.php file</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/nikto21.jpeg</image:loc><image:title>nikto - Directory Indexing</image:title><image:caption>Directory Indexing - DVWA</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/nikto1.jpeg</image:loc><image:title>Nikto results</image:title><image:caption>Nikto results</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/12/nikto.jpeg</image:loc><image:title>Updating Nikto</image:title><image:caption>Updating Nikto</image:caption></image:image><lastmod>2012-12-06T14:54:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/11/29/bypassing-file-upload-restrictions/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/11/file-upload5.jpeg</image:loc><image:title>File Upload - Web Shell has been uploaded</image:title><image:caption>Web Shell has been uploaded</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/11/file-upload4.jpeg</image:loc><image:title>File Upload - Modification of the request to the acceptable type</image:title><image:caption>Modification of the request to the acceptable type</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/11/file-upload2.jpeg</image:loc><image:title>File Upload - HTTP Request While Uploading The PHP File</image:title><image:caption>HTTP Request While Uploading The PHP File</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/11/file-upload1.jpeg</image:loc><image:title>File Upload - Web Application Code</image:title><image:caption>Web Application Code</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/11/file-upload.jpeg</image:loc><image:title>File upload - PHP file cannot be uploaded</image:title><image:caption>PHP file cannot be uploaded</image:caption></image:image><lastmod>2012-12-06T10:05:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/resources/papers/web-application/</loc><lastmod>2012-11-27T16:17:16+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://pentestlab.blog/resources/papers/</loc><lastmod>2012-11-27T16:09:56+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://pentestlab.blog/2012/11/27/automated-source-code-review/</loc><lastmod>2012-11-28T21:27:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/11/26/smtp-vrfy-scanner/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/11/sqlmap9.jpeg</image:loc><image:title>SMTP VRFY Scanner</image:title><image:caption>SMTP VRFY Scanner - Demo</image:caption></image:image><lastmod>2016-11-02T12:00:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/11/12/creating-a-tcp-port-scanner-in-bash/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/11/source-code1.jpeg</image:loc><image:title>Bash TCP Scanner Demo</image:title><image:caption>Bash TCP Scanner Demonstration</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/11/source-code.jpeg</image:loc><image:title>Source Code</image:title><image:caption>Source Code</image:caption></image:image><lastmod>2018-02-16T21:53:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/10/30/attacking-vnc-servers/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/10/7.jpeg</image:loc><image:title>VNC Authentication Scanner</image:title><image:caption>VNC Authentication Scanner</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/10/5.jpeg</image:loc><image:title>VNC Service Discovery</image:title><image:caption>VNC Service Discovery</image:caption></image:image><lastmod>2012-11-24T10:33:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/11/20/smtp-user-enumeration/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/11/smtp4.jpeg</image:loc><image:title>SMTP Username Enumeration via Nmap</image:title><image:caption>SMTP Username Enumeration via Nmap</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/11/smtp3.jpeg</image:loc><image:title>Discover Email addresses via smtp-user-enum</image:title><image:caption>Discover Email addresses via smtp-user-enum</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/11/smtp2.jpeg</image:loc><image:title>SMTP User Enumeration via smtp-user-enum</image:title><image:caption>SMTP User Enumeration via smtp-user-enum</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/11/smtp1.jpeg</image:loc><image:title>Metasploit SMTP Enumeration Results</image:title><image:caption>Metasploit SMTP Enumeration Results</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/11/smtp.jpeg</image:loc><image:title>Metasploit SMTP Enumeration Module - Configuration</image:title><image:caption>Metasploit SMTP Enumeration Module - Configuration</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/11/smtp6.jpeg</image:loc><image:title>RCPT</image:title><image:caption>Enumerating Users with the RCPT command</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/11/smtp5.jpeg</image:loc><image:title>Enumerating SMTP Users - Telnet</image:title><image:caption>Enumerating SMTP Users - Telnet</image:caption></image:image><lastmod>2012-12-12T04:39:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/11/18/default-oracle-accounts/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/11/oracle-large-copy.jpg</image:loc><image:title>Oracle Logo</image:title></image:image><lastmod>2012-11-22T18:00:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/11/19/abusing-file-upload/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/11/upload16.jpeg</image:loc><image:title> Hacked Page</image:title><image:caption>Creating an html page on the webserver </image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/11/upload15.jpeg</image:loc><image:title>Current Logged Users</image:title><image:caption>Current Logged Users</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/11/upload14.jpeg</image:loc><image:title>id - Print UIDs and GIDs  </image:title><image:caption>Print UIDs and GIDs  </image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/11/upload13.jpeg</image:loc><image:title>Parent Working Directory - pwd</image:title><image:caption>Parent Working Directory</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/11/upload12.jpeg</image:loc><image:title>List of services</image:title><image:caption>List of services</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/11/upload11.jpeg</image:loc><image:title>Other users -w</image:title><image:caption>Other users</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/11/upload10.jpeg</image:loc><image:title>Ping Command</image:title><image:caption>Ping the host</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/11/upload9.jpeg</image:loc><image:title>uname -a</image:title><image:caption>Linux Header</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/11/upload8.jpeg</image:loc><image:title>whoami - Current User</image:title><image:caption>whoami - Current User</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/11/upload7.jpeg</image:loc><image:title>Discovering the contents of /etc/passwd</image:title><image:caption>Discovering the contents of /etc/passwd</image:caption></image:image><lastmod>2013-03-21T07:25:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/resources/</loc><lastmod>2012-11-17T19:22:27+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://pentestlab.blog/2012/11/13/dns-reconnaissance-dnsrecon/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/11/dnsrecon2.jpeg</image:loc><image:title>DNSRecon - Reverse Lookup</image:title><image:caption>Reverse Lookup</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/11/dnsrecon11.jpeg</image:loc><image:title>Domain Brute-Force - DNSRecon</image:title><image:caption>Domain Brute-Force </image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/11/dnsrecon1.jpeg</image:loc><image:title>DNSRecon - Standard Enumeration</image:title><image:caption>DNSRecon - Standard Enumeration</image:caption></image:image><lastmod>2019-07-04T04:59:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/11/08/vsftpd-exploitation/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/11/4.jpeg</image:loc><image:title>vsftpd exploitation</image:title><image:caption>vsftpd exploitation</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/11/2.jpeg</image:loc><image:title>vsftpd configuration</image:title><image:caption>Configuring the vsftpd exploit</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/11/1.jpeg</image:loc><image:title>vsftpd module</image:title><image:caption>Searching for the vsftpd module</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/11/5.jpeg</image:loc><image:title>Discovering The VSFTPD Service</image:title><image:caption>Discovering The VSFTPD Service</image:caption></image:image><lastmod>2012-11-09T20:15:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/resources/videos/derbycon/</loc><lastmod>2012-10-28T00:35:38+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://pentestlab.blog/2012/10/27/create-executable-payloads-automatically/</loc><lastmod>2012-10-28T18:44:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/10/13/msfencode-commands/</loc><lastmod>2012-10-30T14:24:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/resources/presentations/derbycon/</loc><lastmod>2012-10-10T14:45:26+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://pentestlab.blog/resources/videos/defcon/</loc><lastmod>2012-10-05T08:52:51+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://pentestlab.blog/2012/09/23/mailing-lists-for-penetration-testers/</loc><lastmod>2012-09-29T14:56:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/09/10/password-list-for-penetration-testing/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/09/passwordscloud.png</image:loc><image:title>Password List For Penetration Testing</image:title></image:image><lastmod>2018-04-21T14:35:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/09/18/sql-injection-exploitation-dvwa/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/09/10.png</image:loc><image:title>Contents of passwd </image:title><image:caption>Read the contents of passwd file</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/09/91.png</image:loc><image:title>Display password hashes of the database</image:title><image:caption>Display the first name and the password hash of the table users</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/09/81.png</image:loc><image:title>Discover Column Names of Table users</image:title><image:caption>Discover Column Names of Table users</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/09/71.png</image:loc><image:title>Location of Database Files</image:title><image:caption>Location of Database Files</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/09/63.png</image:loc><image:title>Hostname Discovery through SQL Injection</image:title><image:caption>Hostname Discovery through SQL Injection</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/09/53.png</image:loc><image:title>owasp10 - tables</image:title><image:caption>owasp10 - tables</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/09/43.png</image:loc><image:title>Information_Schema</image:title><image:caption>Sample of the tables of Information_Schema</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/09/34.png</image:loc><image:title>Current MySQL databases</image:title><image:caption>Current MySQL databases</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/09/25.png</image:loc><image:title>Database Name Discovery</image:title><image:caption>Database Name Discovery</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/09/9.png</image:loc><image:title>Discover the current database user - MySQL</image:title><image:caption>Discovery of the current database user</image:caption></image:image><lastmod>2019-09-16T11:59:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/09/06/configuring-the-social-engineering-toolkit/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/09/42.png</image:loc><image:title>WEBATTACK_EMAIL Option - SET</image:title><image:caption>Email support in combination with credential harvester attack</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/09/31.png</image:loc><image:title>AUTO_DETECT option is OFF</image:title><image:caption>SET asks for public IP when AUTO_DETECT option is OFF</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/09/22.png</image:loc><image:title>SET - Java Applet Self Signed Certificate</image:title><image:caption>SET - Java Applet Self Signed Certificate</image:caption></image:image><lastmod>2020-02-24T17:30:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/09/04/ndiff/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/09/6.png</image:loc><image:title>ndiff - xml output</image:title><image:caption>ndiff - xml output</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/09/51.png</image:loc><image:title>ndiff verbose mode</image:title><image:caption>ndiff verbose mode</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/09/41.png</image:loc><image:title>ndiff basic usage</image:title><image:caption>ndiff basic usage</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/09/3.png</image:loc><image:title>Nmap - XML file </image:title><image:caption>Save the results on an XML file - 2nd Scan</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/09/21.png</image:loc><image:title>Save the results on an XML file</image:title><image:caption>Save the results on an XML file</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/09/5.png</image:loc><image:title>ndiff verbose mode 2</image:title><image:caption>ndiff verbose mode comparison 2nd host</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/09/4.png</image:loc><image:title>Ndiff verbose mode</image:title><image:caption>Ndiff verbose mode</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/09/2.png</image:loc><image:title>Save Nmap output as XML</image:title><image:caption>Save Nmap output as XML file</image:caption></image:image><lastmod>2023-07-19T17:35:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/resources/presentations/defcon/</loc><lastmod>2012-08-27T12:43:23+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://pentestlab.blog/2012/08/26/using-metasploit-to-create-a-war-backdoor/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/08/61.png</image:loc><image:title>netcat listening mode</image:title><image:caption>netcat - incoming connection from backdoor</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/08/22.png</image:loc><image:title>Uploading the WAR File</image:title><image:caption>Uploading the WAR File</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/08/52.png</image:loc><image:title>Metasploit .jsp backdoor</image:title><image:caption>WAR File extraction to find the name of the .jsp file</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/08/11.png</image:loc><image:title>WAR Backdoor - Metasploit</image:title><image:caption>Creating the WAR Backdoor</image:caption></image:image><lastmod>2012-08-26T20:24:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/resources/videos/hack-in-paris/</loc><lastmod>2012-08-26T10:42:21+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://pentestlab.blog/resources/videos/bsides/</loc><lastmod>2012-08-20T00:47:11+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://pentestlab.blog/2012/08/19/scanning-netbios/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/08/51.png</image:loc><image:title>Metasploit smb_version module</image:title><image:caption>Metasploit smb_version module</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/08/31.png</image:loc><image:title>nbtscan-verbose</image:title><image:caption>nbtscan - verbose output</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/08/21.png</image:loc><image:title>nbtscan </image:title><image:caption>nbtscan</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/08/1.jpg</image:loc><image:title>nbtstat </image:title><image:caption>nbtstat usage</image:caption></image:image><lastmod>2017-04-13T03:11:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/08/17/nmap-cheat-sheet/</loc><lastmod>2022-11-24T08:38:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/08/12/firefox-addons-for-penetration-testing/</loc><lastmod>2012-08-12T22:40:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/08/07/token-stealing-and-incognito/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/08/6.png</image:loc><image:title>Steal Token - Metasploit</image:title><image:caption>Steal the token of a user</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/08/5.png</image:loc><image:title>Processes</image:title><image:caption>List of processes from the remote target</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/08/4.png</image:loc><image:title>rev2self</image:title><image:caption>rev2self </image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/08/3.png</image:loc><image:title>Impersonate Token</image:title><image:caption>Impersonate Token</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/08/2.png</image:loc><image:title>List Tokens</image:title><image:caption>List Tokens</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/08/1.png</image:loc><image:title>incognito extension - load</image:title><image:caption>Load the incognito extension in Metasploit</image:caption></image:image><lastmod>2012-08-12T18:23:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/08/01/web-application-fingerprinting/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/08/html-inspection.png</image:loc><image:title>HTML Inspection</image:title><image:caption>Discovering the version via source code inspection</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/08/malformed.png</image:loc><image:title>malformed request to the web server</image:title><image:caption>Malformed request to the web server</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/08/netcraft.png</image:loc><image:title>netcraft</image:title><image:caption>netcraft output</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/08/httprecon.jpg</image:loc><image:title>httprecon</image:title><image:caption>Web Server Fingerprinting - httprecon</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/08/httprint.png</image:loc><image:title>httprint usage</image:title><image:caption>httprint usage</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/08/web-application1.png</image:loc><image:title>Web Server Fingerprinting - Nmap</image:title><image:caption>Web Server Fingerprinting - Nmap</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/08/web-application.png</image:loc><image:title>HTTP Response Header - Telnet</image:title><image:caption>HTTP Response Header - Telnet</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/07/web-application-fingerprinting1.png</image:loc><image:title>Web Application Fingerprinting - netcat</image:title><image:caption>Web Application Fingerprinting - netcat</image:caption></image:image><lastmod>2018-06-12T05:23:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/07/28/update-the-exploit-db-automatically-on-backtrack/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/07/exploitdb-update1.png</image:loc><image:title>ExploitDB-Update Usage</image:title><image:caption>ExploitDB-Update in Action</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/07/exploitdb-update.png</image:loc><image:title>ExploitDB-Update Code</image:title><image:caption>ExploitDB-Update Code</image:caption></image:image><lastmod>2012-12-22T12:34:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/07/27/attacking-mysql-with-metasploit/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/07/extract-credit-cards-details.png</image:loc><image:title>extract credit cards details</image:title><image:caption>Extract all the data from a table</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/07/show-tables-from-dbname.png</image:loc><image:title>Display tables from another database</image:title><image:caption>Display tables from another database</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/07/extract-data-from-table.png</image:loc><image:title>Extract data from mysql table</image:title><image:caption>Extract Usernames and Passwords from Table</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/07/show-databases1.png</image:loc><image:title>Tables of mysql database</image:title><image:caption>Tables of mysql database</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/07/show-databases.png</image:loc><image:title>Show databases</image:title><image:caption>Display the databases</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/07/connect-to-mysql.png</image:loc><image:title>Connection to MySQL Database</image:title><image:caption>Connection to MySQL Database</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/07/enumerating-mysql2.png</image:loc><image:title>Dumping the hashes from the MySQL</image:title><image:caption>Dumping the hashes from the MySQL Database</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/07/enumerating-mysql1.png</image:loc><image:title>enumerating MySQL Accounts</image:title><image:caption>enumerating MySQL Accounts</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/07/enumerating-mysql.png</image:loc><image:title>enumerating MySQL</image:title><image:caption>Enumerating the MySQL Accounts</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/07/valid-accounts-mysql.png</image:loc><image:title>Results of MySQL Login</image:title><image:caption>Discovering valid accounts from the MySQL Database</image:caption></image:image><lastmod>2018-07-24T12:17:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/07/23/dumping-and-cracking-unix-password-hashes/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/07/post-exploitation11.png</image:loc><image:title>SSH connection</image:title><image:caption>Connection through SSH</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/07/post-exploitation10.png</image:loc><image:title>Display passwords</image:title><image:caption>Display all passwords of the target</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/07/post-exploitation8.png</image:loc><image:title>Cracked passwords</image:title><image:caption>Cracked passwords</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/07/post-exploitation7.png</image:loc><image:title>john the ripper</image:title><image:caption>john the ripper directory</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/07/post-exploitation5.png</image:loc><image:title>/etc/shadow</image:title><image:caption>Reading the password hashes of the target</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/07/post-exploitation2.png</image:loc><image:title>/etc/passwd</image:title><image:caption>Reading the /etc/passwd file</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/07/post-exploitation.png</image:loc><image:title>Directories of the remote system</image:title><image:caption>Directories of the remote system</image:caption></image:image><lastmod>2018-03-06T19:48:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/07/20/rlogin-service-exploitation/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/07/rlogin1.png</image:loc><image:title>Connect to the remote host with rlogin</image:title><image:caption>Connect to the remote host with rlogin</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/07/rlogin.png</image:loc><image:title>rsh client installation</image:title><image:caption>rsh client installation</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/07/rlogin2.png</image:loc><image:title>Discovering the rlogin service</image:title><image:caption>Discovering the rlogin service</image:caption></image:image><lastmod>2012-07-20T18:00:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/07/13/dnsenum-gathering-dns-information/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/07/dnsenum2.png</image:loc><image:title>dnsenum2</image:title><image:caption>Administration Panel</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/07/dnsenum1.png</image:loc><image:title>dnsenum1</image:title><image:caption>DNS Zone Transfer</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/07/dnsenum.png</image:loc><image:title>dnsenum</image:title><image:caption>Gathering the first information</image:caption></image:image><lastmod>2013-09-11T21:17:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/07/12/creating-wordlists-with-crunch/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/07/crunch10-number-of-words.png</image:loc><image:title>crunch10-number of words</image:title><image:caption>Number of words</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/07/crunch12-string-permutations.png</image:loc><image:title>crunch12-String permutations</image:title><image:caption>String Permutation - Words</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/07/crunch11-string-permutations.png</image:loc><image:title>crunch11-String permutations</image:title><image:caption>String Permutation - Characters</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/07/crunch13-prefix-wordlists.png</image:loc><image:title>crunch13-prefix wordlists</image:title><image:caption>Prefix Wordlists based on words</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/07/crunch8-compression.png</image:loc><image:title>crunch8-Compression</image:title><image:caption>Compress the wordlist</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/07/crunch7.png</image:loc><image:title>crunch7</image:title><image:caption>Prefix wordlists - Characters</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/07/crunch6.png</image:loc><image:title>crunch6</image:title><image:caption>Splitting Wordlists</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/07/crunch4.png</image:loc><image:title>crunch4</image:title><image:caption>Special Characters</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/07/crunch1.png</image:loc><image:title>crunch1</image:title><image:caption>Output of a sample wordlist</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/07/crunch.png</image:loc><image:title>crunch</image:title><image:caption>Create a sample wordlist</image:caption></image:image><lastmod>2019-09-20T17:51:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/07/03/creating-metasploit-exploits/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/06/metasploit-module-4.png</image:loc><image:title>Metasploit Module 4</image:title><image:caption>Exploit method</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/06/metasploit-module-3.png</image:loc><image:title>Metasploit Module 3</image:title><image:caption>Initialization Method 2</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/06/metasploit-module-2.png</image:loc><image:title>Metasploit Module 2</image:title><image:caption>Initialization Method</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/06/metasploit-module-1.png</image:loc><image:title>Metasploit Module 1</image:title><image:caption>Metasploit Class</image:caption></image:image><lastmod>2012-07-03T05:18:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/06/29/directory-traversal-cheat-sheet/</loc><lastmod>2013-08-21T08:59:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/06/24/nmap-script-to-screenshot-web-services/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/06/screenshot-nmap-15-216-12-1280.png</image:loc><image:title>screenshot-nmap-15.216.12.12:80</image:title><image:caption>Screenshot of a web application from Nmap</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/06/4.png</image:loc><image:title>http-screenshot script in use</image:title><image:caption>http-screenshot script in use</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/06/3.png</image:loc><image:title>http-screenshot code</image:title><image:caption>http-screenshot script - code</image:caption></image:image><lastmod>2012-07-19T18:52:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/04/23/metasploit-browser-autopwn/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/67.png</image:loc><image:title>Migrate to another process</image:title><image:caption>Migrate to another process</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/410.png</image:loc><image:title>Meterpreter sessions opened</image:title><image:caption>Meterpreter sessions opened with Browser Autopwn</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/39.png</image:loc><image:title>Loading the browser exploits</image:title><image:caption>Loading the browser exploits</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/216.png</image:loc><image:title>Configuring the Browser Autopwn</image:title><image:caption>Configuring the Browser Autopwn</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/129.png</image:loc><image:title>Options of browser autopwn module</image:title><image:caption>Options of browser autopwn module</image:caption></image:image><lastmod>2015-03-13T12:41:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/04/22/post-exploitation-port-forwarding/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/58.png</image:loc><image:title>Accessing the Web Server</image:title><image:caption>Accessing the Web Server</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/49.png</image:loc><image:title>Port Forwarding configurations</image:title><image:caption>Port Forwarding configurations</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/38.png</image:loc><image:title>Port Forwarding Options</image:title><image:caption>Port Forwarding Options</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/215.png</image:loc><image:title>Discover open ports on the remote system</image:title><image:caption>Discover open ports on the remote system</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/128.png</image:loc><image:title>Configuring the Routing Table</image:title><image:caption>Configuring the Routing Table</image:caption></image:image><lastmod>2012-06-09T19:00:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/04/19/building-profiles-for-a-social-engineering-attack/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/1111.png</image:loc><image:title>Personal page </image:title><image:caption>Personal page </image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/57.png</image:loc><image:title>Work Phone Number and Office Room</image:title><image:caption>Work Phone Number and Office Room</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/214.png</image:loc><image:title>Pipl </image:title><image:caption>Information gathering on Pipl</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/341.png</image:loc><image:title>Facebook Profile</image:title><image:caption>Facebook Profile</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/213.png</image:loc><image:title>Linkedin Profile</image:title><image:caption>Linkedin Profile</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/93.png</image:loc><image:title>Email addresses output from Metasploit module</image:title><image:caption>Email addresses output from Metasploit module</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/1110.png</image:loc><image:title>Discover profiles on the Linkedin</image:title><image:caption>Discover profiles on the Linkedin</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/127.png</image:loc><image:title>theHarvester email addresses output</image:title><image:caption>theHarvester email addresses output</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/103.png</image:loc><image:title>Using theHarvester </image:title><image:caption>Using theHarvester </image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/212.png</image:loc><image:title>Discovery of valid mit.edu email addresses</image:title><image:caption>Discovery of valid mit.edu email addresses</image:caption></image:image><lastmod>2012-04-20T18:40:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/04/17/qrcode-attack-vector/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/56.png</image:loc><image:title>harvesting the credentials</image:title><image:caption>Harvesting the credentials</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/qrcode_attack.png</image:loc><image:title>Malicious QRCode</image:title><image:caption>Malicious QR Code</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/86.png</image:loc><image:title>Inserting the malicious link</image:title><image:caption>Inserting the malicious link</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/66.png</image:loc><image:title>QR Code Generator Attack Vector</image:title><image:caption>QR Code Generator Attack Vector</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/48.png</image:loc><image:title>Cloning Facebook</image:title><image:caption>Cloning Facebook</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/37.png</image:loc><image:title>Select from the existing templates Facebook</image:title><image:caption>Select from the existing templates Facebook</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/210.png</image:loc><image:title>Choosing the Credential Harvester Attack</image:title><image:caption>Choosing the Credential Harvester Attack</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/120.png</image:loc><image:title>Selecting the Website Attack Vector</image:title><image:caption>Selecting the Website Attack Vector</image:caption></image:image><lastmod>2014-12-10T03:33:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/04/16/creating-an-undetectable-backdoor/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/55.png</image:loc><image:title>Well known antivirus did not detect the backdoor</image:title><image:caption>Well known antivirus did not detect the backdoor</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/47.png</image:loc><image:title>Detection ratio</image:title><image:caption>Detection ratio</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/102.png</image:loc><image:title>Meterpreter Session Opened after the execution of the backdoor</image:title><image:caption>Meterpreter Session Opened after the execution of the backdoor</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/1231.png</image:loc><image:title>Open the malicious link</image:title><image:caption>Open the malicious link</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/125.png</image:loc><image:title>Execution of pentestlab.exe</image:title><image:caption>Execution of pentestlab.exe</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/133.png</image:loc><image:title>Sample of the Backdoor code</image:title><image:caption>Sample of the Backdoor code</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/85.png</image:loc><image:title>pentestlab.bin file opened with a hexeditor</image:title><image:caption>pentestlab.bin file opened with a hexeditor</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/92.png</image:loc><image:title>Creating the .bin fle</image:title><image:caption>Creating the .bin fle</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/72.png</image:loc><image:title>Returning a meterpreter session</image:title><image:caption>Returning a meterpreter session</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/65.png</image:loc><image:title>Configuring the multi/handler module</image:title><image:caption>Configuring the multi/handler module</image:caption></image:image><lastmod>2014-11-20T08:49:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/04/13/attacking-postgresql/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/116.png</image:loc><image:title>116</image:title><image:caption>Discovery of PostgreSQL Database</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/28.png</image:loc><image:title>2</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/54.png</image:loc><image:title>Creating a new table and copying the contents of passwd</image:title><image:caption>Creating a new table and copying the contents of passwd</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/64.png</image:loc><image:title>List the current databases</image:title><image:caption>List the current databases</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/84.png</image:loc><image:title>Discover valid credentials on postgreSQL database</image:title><image:caption>Valid credentials discovered on postgreSQL database</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/71.png</image:loc><image:title>Choosing and configuring the postgres scanner</image:title><image:caption>Choosing and configuring the postgres scanner</image:caption></image:image><lastmod>2012-04-14T15:20:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/04/12/client-side-attack-and-pivoting/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/27.png</image:loc><image:title>Active Sessions</image:title><image:caption>Active Sessions</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/251.png</image:loc><image:title>Target Exploitation</image:title><image:caption>Target Exploitation</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/241.png</image:loc><image:title>netapi exploit configurations</image:title><image:caption>netapi exploit configurations</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/221.png</image:loc><image:title>Port Scanner Results</image:title><image:caption>Port Scanner Results</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/211.png</image:loc><image:title>Configuring the TCP port scanner</image:title><image:caption>Configuring the TCP port scanner</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/20.png</image:loc><image:title>Searching for available port scanners</image:title><image:caption>Searching for available port scanners</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/181.png</image:loc><image:title>Discovery of another system into the second network</image:title><image:caption>Discovery of another system into the second network</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/191.png</image:loc><image:title>Configuring the nbname</image:title><image:caption>Configuring the nbname</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/171.png</image:loc><image:title>Route Traffic to the other network</image:title><image:caption>Route Traffic to the other network</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/151.png</image:loc><image:title>Searching for nbname</image:title><image:caption>Searching for nbname</image:caption></image:image><lastmod>2012-09-15T18:04:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/04/10/unix-user-enumeration/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/45.png</image:loc><image:title>Discover valid usernames through SMTP</image:title><image:caption>Discover valid usernames through SMTP</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/112.png</image:loc><image:title>SMTP </image:title><image:caption>SMTP - Commands</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/36.png</image:loc><image:title>rusers</image:title><image:caption>rusers output</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/63.png</image:loc><image:title>Enumerate all users with the string user</image:title><image:caption>Enumerate all users with the string user</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/44.png</image:loc><image:title>Finger a specific user</image:title><image:caption>Finger a specific user</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/35.png</image:loc><image:title>Examine the contents of the plan file</image:title><image:caption>Examine the contents of the plan file</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/26.png</image:loc><image:title>List the logged users on the remote host</image:title><image:caption>List the logged users on the remote host</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/110.png</image:loc><image:title>Discovery of the Finger Service</image:title><image:caption>Discovery of the Finger Service</image:caption></image:image><lastmod>2012-04-10T17:30:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/04/08/infectious-media-attack/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/62.png</image:loc><image:title>Obtain a Remote Shell</image:title><image:caption>Obtain a Remote Shell</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/122.png</image:loc><image:title>Malicious PDF</image:title><image:caption>Malicious PDF</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/53.png</image:loc><image:title>Generating the Exploit</image:title><image:caption>Generating the Exploit</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/43.png</image:loc><image:title>Choose the payload</image:title><image:caption>Choose the payload</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/34.png</image:loc><image:title>Available Payloads</image:title><image:caption>Available Payloads</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/25.png</image:loc><image:title>Selecting the Attack Vector</image:title><image:caption>Selecting the Attack Vector</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/16.png</image:loc><image:title>Infectious Media Generator</image:title><image:caption>Infectious Media Generator</image:caption></image:image><lastmod>2012-04-08T22:00:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/04/08/pass-the-hash-attack/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/snapshot5.png</image:loc><image:title>Authentication with the Administrator's hash</image:title><image:caption>Authentication with the Administrator's hash</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/snapshot4.png</image:loc><image:title>psexec configurations</image:title><image:caption>psexec configurations</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/snapshot7.png</image:loc><image:title>Nmap script </image:title><image:caption>Discovery of the workgroup</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/snapshot6.png</image:loc><image:title>Description of psexec</image:title><image:caption>Description of psexec</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/snapshot3.png</image:loc><image:title>Obtaining the hashes</image:title><image:caption>Obtaining the hashes</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/snapshot2.png</image:loc><image:title>Exploitation of the system</image:title><image:caption>Exploitation of the system</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/snapshot1.png</image:loc><image:title>Configuring the exploit</image:title><image:caption>Configuring the exploit</image:caption></image:image><lastmod>2012-04-08T01:32:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/04/06/post-exploitation-disable-firewall-and-kill-antivirus/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/010.png</image:loc><image:title>No records in the Event Viewer</image:title><image:caption>No records in the Event Viewer</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/18.png</image:loc><image:title>Clear the log files</image:title><image:caption>Clear the log files</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/17.png</image:loc><image:title>Kill the remaing AVG processes</image:title><image:caption>Kill the remaining AVG processes</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/15.png</image:loc><image:title>Find the running processes of AVG after the reboot</image:title><image:caption>Find the running processes of AVG after the reboot</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/141.png</image:loc><image:title>Reboot the remote target</image:title><image:caption>Reboot the remote target</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/131.png</image:loc><image:title>Disable the AVG Services</image:title><image:caption>Disable the AVG Services</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/121.png</image:loc><image:title>Attributes of AVG services</image:title><image:caption>Attributes of AVG services</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/111.png</image:loc><image:title>Find the AVG processes</image:title><image:caption>Discovery of the AVG services</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/10.png</image:loc><image:title>Categorize the services</image:title><image:caption>Categorize the services</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/9.png</image:loc><image:title>Processes of the remote system</image:title><image:caption>Processes of the remote system</image:caption></image:image><lastmod>2022-01-07T14:02:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/04/05/samba-server-exploitation/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/32.png</image:loc><image:title>Samba Exploit Execution</image:title><image:caption>Samba Exploit Execution</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/41.png</image:loc><image:title>Description of the Samba Exploit</image:title><image:caption>Description of the Samba Exploit</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/13.png</image:loc><image:title>Setting up the Samba Exploit</image:title><image:caption>Setting up the Samba Exploit</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/51.png</image:loc><image:title>Identifying Samba Service</image:title><image:caption>Identifying Samba Service</image:caption></image:image><lastmod>2014-04-07T12:45:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/04/04/metasploit-framework-payload-commands/</loc><lastmod>2012-04-04T12:26:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/04/02/nmap-techniques-for-avoiding-firewalls/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/01.png</image:loc><image:title>Log Files flooded with decoy addresses</image:title><image:caption>Log Files flooded with decoy addresses</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/0.png</image:loc><image:title>Specify decoy addresses manually</image:title><image:caption>Scanning with decoy addresses </image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/31.png</image:loc><image:title>Specify a specific MTU to the packets</image:title><image:caption>Specify a specific MTU to the packets</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/12.png</image:loc><image:title>Fragment packet</image:title><image:caption>Capture a fragment packet</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/23.png</image:loc><image:title>2</image:title></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/22.png</image:loc><image:title>Fragment Packets - Nmap</image:title><image:caption>Fragment Packets - Nmap</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/log-files-idle-scan.png</image:loc><image:title>Log Files - Idle Scan</image:title><image:caption>Firewall Log Files - Idle Scan</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/7.png</image:loc><image:title>Executing an Idle Scan</image:title><image:caption>Executing an Idle Scan</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/8.png</image:loc><image:title>ipidseq</image:title><image:caption>Discover Zombies</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/04/4.png</image:loc><image:title>A sample of a packet that we have add 25 more bytes to avoid detection</image:title><image:caption>A sample of a packet that we have add 25 more bytes to avoid detection</image:caption></image:image><lastmod>2014-05-26T04:45:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/04/01/password-security-101/</loc><lastmod>2012-08-17T02:33:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/03/30/java-exploit-attack-cve-2012-0507/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/84.png</image:loc><image:title>List the sessions that the Java Exploit opened</image:title><image:caption>List the sessions that the Java Exploit opened</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/76.png</image:loc><image:title>Exploiting the Vulnerability</image:title><image:caption>Exploiting the Vulnerability</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/66.png</image:loc><image:title>Execution of the Java Exploit</image:title><image:caption>Execution of the Java Exploit</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/58.png</image:loc><image:title>Payload Options</image:title><image:caption>Payload Options</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/48.png</image:loc><image:title>Configuring the payload</image:title><image:caption>Configuring the payload</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/39.png</image:loc><image:title>Java Exploit Settings and Payloads</image:title><image:caption>Java Exploit Settings and Payloads</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/211.png</image:loc><image:title>Options for the Java Exploit</image:title><image:caption>Options for the Java Exploit</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/112.png</image:loc><image:title>Search for Java Atomic Reference Array Exploit</image:title><image:caption>Search for Java Atomic Reference Array Exploit</image:caption></image:image><lastmod>2013-01-02T09:26:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/03/29/windows-2003-server-exploitation/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/57.png</image:loc><image:title>Information about the remote system</image:title><image:caption>Information about the remote system</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/47.png</image:loc><image:title>Exploitation with the Netapi</image:title><image:caption>Exploitation with the Netapi</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/38.png</image:loc><image:title>netapi exploit configuration</image:title><image:caption>Netapi Exploit Configuration</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/210.png</image:loc><image:title>Search for the netapi exploit</image:title><image:caption>Search for the netapi Exploit</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/110.png</image:loc><image:title>Microsoft-DS</image:title><image:caption>Microsoft-ds Service is Open</image:caption></image:image><lastmod>2014-07-09T15:10:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/03/28/metasploit-metsvc-backdoor/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/03.png</image:loc><image:title>Backdoor files</image:title><image:caption>Backdoor files</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/46.png</image:loc><image:title>Remove the metsvc backdoor</image:title><image:caption>Remove the metsvc backdoor</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/0.png</image:loc><image:title>Metsvc process</image:title><image:caption>Metsvc process</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/29.png</image:loc><image:title>Run the Metsvc Backdoor</image:title><image:caption>Run the Metsvc Backdoor</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/19.png</image:loc><image:title>Metsvc Help</image:title><image:caption>Metsvc Help</image:caption></image:image><lastmod>2012-03-28T04:10:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/03/26/meterpreter-commands/</loc><lastmod>2012-03-26T16:03:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/03/26/microsoft-rdp-vulnerability-poc/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/45.png</image:loc><image:title>BSOD</image:title><image:caption>Blue Screen after the execution of RDP Module</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/37.png</image:loc><image:title>Executing the RDP Module</image:title><image:caption>Executing the RDP DoS Module</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/28.png</image:loc><image:title>Configuring the RDP DoS Module</image:title><image:caption>Configuring the RDP DoS Module</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/18.png</image:loc><image:title>Search for RDP</image:title><image:caption>Search for RDP exploits</image:caption></image:image><lastmod>2017-06-16T06:11:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/03/23/web-jacking-attack-method/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/44.png</image:loc><image:title>Capturing the Credentials</image:title><image:caption>Capturing the Credentials</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/65.png</image:loc><image:title>Fake Facebook Page</image:title><image:caption>Fake Facebook Page</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/56.png</image:loc><image:title>Web Jacking Message</image:title><image:caption>Message after opening the link</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/36.png</image:loc><image:title>Site Cloner</image:title><image:caption>Cloning Facebook</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/27.png</image:loc><image:title>Web Jacking Attack Method</image:title><image:caption>Web Jacking Attack Method</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/17.png</image:loc><image:title>Web Site Attack Vectors</image:title><image:caption>Web Site Attack Vectors</image:caption></image:image><lastmod>2012-03-23T18:58:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/03/23/rpc-service-exploitation-in-windows-xp/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/75.png</image:loc><image:title>Checking for remote connections</image:title><image:caption>Checking for remote connections</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/55.png</image:loc><image:title>Exploit the Target</image:title><image:caption>Exploit the Target</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/43.png</image:loc><image:title>DCOM Exploit Settings</image:title><image:caption>DCOM Exploit Settings</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/35.png</image:loc><image:title>DCOM Exploit Options</image:title><image:caption>DCOM Exploit Options</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/26.png</image:loc><image:title>search for DCOM Exploit</image:title><image:caption>Search for DCOM Exploit</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/16.png</image:loc><image:title>RPC service in Windows XP</image:title><image:caption>RPC service in Windows XP</image:caption></image:image><lastmod>2012-03-23T11:24:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/03/22/apache-tomcat-exploitation/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/92.png</image:loc><image:title>Apache Tomcat with login with valid account</image:title><image:caption>Apache Tomcat with login with valid account</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/83.png</image:loc><image:title>Tomcat Login</image:title><image:caption>Tomcat Login Screen</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/10.png</image:loc><image:title>Meterpreter Session through Apache Tomcat</image:title><image:caption>Meterpreter Session through Apache Tomcat</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/74.png</image:loc><image:title>Exploitation of Apache Tomcat</image:title><image:caption>Exploitation of Apache Tomcat</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/64.png</image:loc><image:title>Exploit Settings</image:title><image:caption>Exploit Settings</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/54.png</image:loc><image:title>Apache Tomcat Exploit</image:title><image:caption>Apache Tomcat Exploit</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/25.png</image:loc><image:title>Discovery Valid Credentials in Apache Tomcat</image:title><image:caption>Discovery Valid Credentials in Apache Tomcat</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/24.png</image:loc><image:title>Discovery of Valid Credentials on the Apache Tomcat</image:title><image:caption>Discovery of Valid Credentials on the Apache Tomcat</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/34.png</image:loc><image:title>Configuration on the scanner</image:title><image:caption>Configuration on the scanner</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/15.png</image:loc><image:title>Available Modules for Apache Tomcat</image:title><image:caption>Available Modules for Apache Tomcat</image:caption></image:image><lastmod>2012-08-04T21:33:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/03/20/tabnabbing-attack-method/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/82.png</image:loc><image:title>Capturing the Credentials</image:title><image:caption>Capturing the Credentials</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/63.png</image:loc><image:title>Fake Gmail Page</image:title><image:caption>Fake Gmail Page</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/53.png</image:loc><image:title>Opening the webpage</image:title><image:caption>Opening the webpage</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/42.png</image:loc><image:title>Enter the Fake Website</image:title><image:caption>Enter the Fake Website for Cloning</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/33.png</image:loc><image:title>Selecting the Site Cloner</image:title><image:caption>Selecting the Site Cloner</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/23.png</image:loc><image:title>Selecting the Tabnabbing Attack</image:title><image:caption>Selecting the Tabnabbing Attack</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/14.png</image:loc><image:title>Website Attack Vector</image:title><image:caption>Website Attack Vector</image:caption></image:image><lastmod>2019-09-04T06:28:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/03/17/metasploit-persistent-backdoor/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/91.png</image:loc><image:title>Removing the backdoor</image:title><image:caption>Removing the Backdoor</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/81.png</image:loc><image:title>information about the remote target</image:title><image:caption>Information about the remote target</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/73.png</image:loc><image:title>Interactive sessions</image:title><image:caption>Checking if the backdoor has opened a new session</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/62.png</image:loc><image:title>Windows is Shutting Down</image:title><image:caption>Windows is shutting down</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/52.png</image:loc><image:title>Rebooting the remote system</image:title><image:caption>Send the command for reboot</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/41.png</image:loc><image:title>Active Sessions </image:title><image:caption>Active Sessions</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/32.png</image:loc><image:title>Persistenc Backdoor in Windows</image:title><image:caption>The location of the script on the remote system</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/22.png</image:loc><image:title>Execution of Persistence Backdoor</image:title><image:caption>Execution of Persistence Backdoor</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/13.png</image:loc><image:title>Persistence Backdoor Options</image:title><image:caption>Persistent Backdoor Options</image:caption></image:image><lastmod>2012-03-17T21:52:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/03/13/msfconsole-commands-cheat-sheet/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/workingmetasploit.png</image:loc><image:title>MSFconsole Commands Cheat Sheet</image:title></image:image><lastmod>2012-03-14T12:15:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/03/12/internet-explorer-aurora-exploit/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/72.png</image:loc><image:title>Attepmting Privilege Escalation - Aurora</image:title><image:caption>Privilege Escalation</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/61.png</image:loc><image:title>Starting the Session - Aurora Exploit</image:title><image:caption>Starting the session and migration to another process</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/51.png</image:loc><image:title>Running the Aurora Exploit</image:title><image:caption>Running the Aurora Exploit</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/31.png</image:loc><image:title>Setting the Aurora and the payload</image:title><image:caption>Setting the Aurora and the payload</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/21.png</image:loc><image:title>Analyzing the Options of Aurora</image:title><image:caption>Analyzing the Options of Aurora Exploit</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/12.png</image:loc><image:title>Search for the Aurora</image:title><image:caption>Searching for the Aurora and use of the payload</image:caption></image:image><lastmod>2012-03-12T10:11:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/resources/videos/</loc><lastmod>2012-03-09T00:02:03+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://pentestlab.blog/2012/03/08/nmap-scripting-engine-basic-usage-2/</loc><lastmod>2017-02-25T19:44:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/03/06/common-user-passwords-profiler/</loc><lastmod>2012-05-21T16:01:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/03/05/common-tcpip-ports/</loc><lastmod>2012-03-05T04:45:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/resources/presentations/</loc><lastmod>2012-03-04T02:45:30+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://pentestlab.blog/2012/03/03/java-applet-attack-method/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/71.png</image:loc><image:title>Obtaining the remote shell</image:title><image:caption>Obtaining the remote shell</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/6.png</image:loc><image:title>Command Shell Session Opened</image:title><image:caption>Command Shell Session Opened</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/871.jpg</image:loc><image:title>Java Applet Attack in Action</image:title><image:caption>Java Applet Attack in Action</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/87.jpg</image:loc><image:title>Java Applet Attack </image:title><image:caption>Java Applet Attack in Action</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/5.png</image:loc><image:title>Exploit Settings</image:title><image:caption>Exploit Settings </image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/13.jpeg</image:loc><image:title>SET is Setting the Web Server </image:title><image:caption>Launch of the Web Server through SET </image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/12.jpeg</image:loc><image:title>Creation of the Backdoor and Setting the port of the Listener</image:title><image:caption>Creation of the Backdoor and Setting the port of the Listener</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/4.png</image:loc><image:title>Selection of the Encoding </image:title><image:caption>Selection of the encoding</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/9.png</image:loc><image:title>Selecting the payload</image:title><image:caption>Selecting the payload</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/03/3.png</image:loc><image:title>Cloning the website</image:title><image:caption>Cloning the Website</image:caption></image:image><lastmod>2017-02-13T12:20:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/03/01/attacking-the-ftp-service/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/02/12.jpg</image:loc><image:title>Login with msfadmin</image:title><image:caption>Login with msfadmin</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/02/111.jpg</image:loc><image:title>Directory of usernames</image:title><image:caption>Directory of usernames</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/02/10.jpg</image:loc><image:title>Login to the FTP server via browser</image:title><image:caption>Login to the FTP server via browser</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/02/9.jpg</image:loc><image:title>Get command</image:title><image:caption>Download the file to our computer</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/02/8.jpg</image:loc><image:title>ls -lat</image:title><image:caption>Execution of the command ls -lat</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/02/7.jpg</image:loc><image:title>Login on the FTP server</image:title><image:caption>Login with a valid account on the FTP server</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/02/6.jpg</image:loc><image:title>Discovery of the user</image:title><image:caption>Discovery of the user username/password</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/02/5.jpg</image:loc><image:title>Discovery of the Service</image:title><image:caption>Discovery of the service username/password</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/02/4.jpg</image:loc><image:title>Postgres </image:title><image:caption>Discovery of the postgres username/password </image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/02/15.jpg</image:loc><image:title>FTP Scanner Configuration</image:title><image:caption>FTP Scanner Settings</image:caption></image:image><lastmod>2016-09-24T00:54:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/02/26/port-scanning-with-metasploit/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/02/8.png</image:loc><image:title>TCP Scan Results</image:title><image:caption>TCP Scan Results</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/02/9.png</image:loc><image:title>TCP Scanner Settings</image:title><image:caption>TCP Scanner Settings</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/02/7.png</image:loc><image:title>Options for TCP Scanner of Metasploit</image:title><image:caption>Available options of TCP Scanner</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/02/5.png</image:loc><image:title>Scanning the target </image:title><image:caption>Scanning the target with SYN scan</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/02/4.png</image:loc><image:title>Port Range Setting</image:title><image:caption>Port Range Setting</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/02/3.png</image:loc><image:title>SYN Scanner Options</image:title><image:caption>SYN Scanner Options</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/02/2.png</image:loc><image:title>Configuration of SYN Scanner</image:title><image:caption>Configuration of SYN Scanner</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/02/1.png</image:loc><image:title>Choosing the Port Scanner</image:title><image:caption>Choosing the Port Scanner</image:caption></image:image><lastmod>2023-11-25T17:39:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/02/24/credential-harvester-attack-method/</loc><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/02/snapshot9.png</image:loc><image:title>SET discovering the Credentials</image:title><image:caption>Grabbing the Username and the Password</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/02/2.jpg</image:loc><image:title>Credentials on Facebook</image:title><image:caption>User is inserting his credentials</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/02/1.jpg</image:loc><image:title>Facebook Login Page</image:title><image:caption>Facebook Login Page</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/02/snapshot8.png</image:loc><image:title>Credential Harvester Attack in Use</image:title><image:caption>Waiting to capture credentials</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/02/snapshot7.png</image:loc><image:title>Site Cloner </image:title><image:caption>Entering the Website that it will be Cloned</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/02/snapshot2.jpg</image:loc><image:title>Site Cloner</image:title><image:caption>Choosing the Site Cloner Method</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/02/snapshot4.png</image:loc><image:title>Credential Harvester Attack Method</image:title><image:caption>Choosing the Credential Harvester Attack Method</image:caption></image:image><image:image><image:loc>https://pentestlab.blog/wp-content/uploads/2012/02/snapshot3.png</image:loc><image:title>SET Menu</image:title><image:caption>SET Menu</image:caption></image:image><lastmod>2014-12-17T11:01:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/02/19/why-build-a-penetration-testing-lab/</loc><lastmod>2015-07-22T05:51:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog/2012/02/21/hardware-equipment-for-penetration-testing-labs/</loc><lastmod>2019-11-08T02:58:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pentestlab.blog</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2024-10-08T17:19:31+00:00</lastmod></url></urlset>
