📘
DFIR
Ctrlk
  • Networking
    • Networking
  • Windows
    • Administration
    • Forensics
      • System Info
      • Memory
      • Network Logs
      • File System
      • Registry
      • Network Share
      • Exfiltration
      • Evidence of Execution
      • Hacktool Artifacts
      • Event Logs
        • Event Log IDs
        • Windows Defender
        • LOLBins
          • WebDav
          • Crashes (WER)
          • PowerShell
          • Scheduled Tasks
          • Services
          • WinRS
          • WinRM
          • RDP
          • WMI
        • DNS Logs
        • Application NTDS.dit
        • Kerberos
        • Exchange
        • GPOs and OUs
        • Anti Forensics
      • 3rd Party Apps
      • Example Page
    • Cheat Sheet
    • Investigation
    • Internals
    • Active Directory
    • MISC
  • Linux
    • Forensics
    • SSH
    • Linux WebShells
    • Directories of Interest
    • Internals
  • Enterprise Architecture
    • CI/CD Pipline
    • Citrix
    • Web Applications
    • The Cloud
    • vSphere
    • Containers
    • Troubleshooting
  • Mac
    • Forensics
  • Attacker Information
    • Adversary Operations
    • Actor Playbooks
    • Abused Domains
  • IR Playbook
    • Activity from Unmanaged Host
    • Recommendations
  • Reverse Engineering
    • Python - Pyinstaller
Powered by GitBook
On this page
  1. Windows
  2. Forensics
  3. Event Logs
  4. LOLBins

WebDav

LogoBeyond File Search: A Novel Methodwww.trellix.com
LogoInitial Access – search-ms URI HandlerPenetration Testing Lab
LogoA redirect chainBadOption.eu
LogoSearch-ms, WebDAV, and ChillMedium
LogoGetting started with parameter-value arguments - Win32 appsMicrosoftLearn

PreviousLOLBinsNextCrashes (WER)

Last updated 1 year ago

search-ms:query=*&crumb=location:\\localhost\webber\&displayname=pentestlaboratories

search-ms:query=*&crumb=location:\\10.120.116.20\&displayname=pentestlaboratories

https://localhost:4433/webd/

sudo wsgidav --port=80 --host=0.0.0.0 --root=. --auth=anonymous