Windows-Heavy Tools & Concepts Flashcards

Common Windows exploitation tools and concepts (17 cards)

1
Q

What is PowerShell and how do attackers use it?

A

Microsoft automation/scripting framework. Used for exploitation (payloads), persistence (tasks/registry), and automation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does Mimikatz do?

A

Dumps plaintext passwords, hashes, and Kerberos tickets from memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Rubeus used for?

A

Kerberos ticket abuse (request, renew, forge) for lateral movement or privilege escalation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does Certify target?

A

Active Directory Certificate Services (AD CS) to escalate privileges or persist.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Seatbelt used for?

A

Situational awareness — enumerates creds, security settings, configs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Evil-WinRM?

A

Remote PowerShell console used post-exploitation for command execution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does PsExec do?

A

Executes processes remotely over SMB.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are LOLBins and why do attackers use them?

A

Legit Windows binaries (rundll32, msbuild, regsvr32) abused to execute code stealthily and evade detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Pass-the-Hash?

A

Using a stolen NTLM hash to authenticate without cracking it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Pass-the-Ticket?

A

Using a stolen Kerberos ticket (TGT/TGS) to impersonate a user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Golden Ticket?

A

A forged Kerberos TGT granting domain admin rights.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How do attackers use the Windows Registry?

A

For persistence (autoruns, malicious services) and credential storage (SAM, DPAPI keys).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is WMI used for in attacks?

A

Remote code execution, lateral movement, reconnaissance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is WinRM used for in attacks?

A

Remote PowerShell sessions over HTTP(S) for lateral movement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why is RDP a common attack vector?

A

Allows remote desktop access; often brute-forced or exploited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why is SMB a common attack vector?

A

File sharing protocol used for lateral movement and exploited by attacks like EternalBlue.

17
Q

What is LDAP used for and how is it abused?

A

Directory queries (user/computer enumeration). 636 is secure LDAP (LDAPS).