๐Ÿฉ
HackBook.io
Ctrlk
  • Pentesting Pocket Book for hackers and developers.
  • Reconnaissance
    • Internal Recon Basics
    • OSINT
    • Active Scanning
    • Web Server OSINT
  • Web Application Hacking
    • Web 101
    • Web Hacking Techniques
    • Web Hacking Procedures
  • Weaponization
    • Buffer Overflows (BOF)
  • Initial Access
    • ๐Ÿ˜ˆServices
    • ๐Ÿ˜ˆShells
  • Persistence
    • File Transfers
    • Backdoors
  • Privilege Escalation
    • Universal Escalation
    • Windows Escalation
      • Automated
      • Popular Exploits
        • ActiveXObject to Wscript RCE
        • Macros
        • Object Linking
    • Linux Escalation
    • Passwords
  • Network Discovery
    • Network Traffic
    • Internal Discovery
  • Collection and Staging
    • Collection
  • Hacking Objectives
    • Non Kinetic War (Quick Guide)
  • Procedures
    • Bash Guide
    • Active Directory
    • Crypto 101
    • Forensics
  • Glossary
  • Hacking Frameworks
    • Metasploit
    • Dsnif
  • ThreatModeling
    • Threat Modeling Overview
  • Certifications
    • VMDR
    • OSCP Cheat Sheet
  • RF - Radio Frequency
    • Ham Technician
Powered by GitBook
On this page
  1. Privilege Escalation
  2. Windows Escalation

Popular Exploits

ActiveXObject to Wscript RCEMacrosObject Linking
PreviousAutomatedNextActiveXObject to Wscript RCE

Last updated 4 years ago

Was this helpful?

Was this helpful?