πCommunication with Processes
π― Overview
π Access Tokens
Concept
π Network Service Enumeration
Active Connections Analysis
Target Service Categories
Service-to-Process Mapping
π Named Pipes
Concept
Named Pipe Enumeration
Using Pipelist (Sysinternals)
Using PowerShell
Named Pipe Security Analysis
Permission Enumeration with AccessChk
Dangerous Permission Patterns
π¨ Common Attack Vectors
Web Server Exploitation
FileZilla Server Attack
Splunk Universal Forwarder
Named Pipe Privilege Escalation
π― HTB Academy Lab Solutions
Lab Environment
Question 1: Service on Port 21
Question 2: WRITE_DAC Privileges on Named Pipe
π Attack Pattern Recognition
Network Service Indicators
Named Pipe Red Flags
Service Context Analysis
π Process Communication Checklist
Network Services
Named Pipes
Attack Surface Assessment
π‘ Key Takeaways
Last updated