π΄ββ οΈLiving Off the Land
π Overview
π― Strategic Context
π‘οΈ When to Use Living Off the Land
β οΈ Operational Considerations
π§ Basic Environmental Reconnaissance
π Host Information Gathering
Essential System Commands
Comprehensive System Information
β‘ PowerShell Reconnaissance
π PowerShell Environment Analysis
π PowerShell Version Downgrade (Stealth Technique)
π‘οΈ Security Controls Assessment
π₯ Windows Firewall Enumeration
π‘οΈ Windows Defender Assessment
π₯ Session and User Analysis
π Network Intelligence Gathering
π Network Configuration Discovery
π Network Intelligence Analysis
π WMI (Windows Management Instrumentation)
π Core WMI Queries
System and Domain Information
Advanced WMI Techniques
π Net Commands
π Essential Net Command Reference
π Domain Enumeration Examples
π Net1 Stealth Technique
π Dsquery (Directory Services Query)
π Overview
π₯ User and Computer Enumeration
π Advanced LDAP Filtering
π§ LDAP Filter Components
OID (Object Identifier) Rules
UserAccountControl Values
Logical Operators
π― HTB Academy Lab Solutions
π Lab Questions & Solutions
π‘οΈ Question 1: "Enumerate the host's security configuration information and provide its AMProductVersion."
π₯ Question 2: "What domain user is explicitly listed as a member of the local Administrators group on the target host?"
π© Question 3: "Utilizing techniques learned in this section, find the flag hidden in the description field of a disabled account with administrative privileges. Submit the flag as the answer."
π§ Advanced Native Techniques
π PowerShell One-Liners
π WMI Remote Enumeration
π Registry-Based Discovery
β‘ Quick Reference Commands
π§ Essential Command Matrix
π Rapid Enumeration Script
π Key Takeaways
β
Native Tool Advantages
π― Strategic Enumeration Priorities
β οΈ Operational Security Considerations
π Escalation Pathways
Last updated