DevNull Notes
CtrlK
DevNull Notes
DevNull Notes
  • README
  • OSCP CheatSheet
    • Scanning
  • windows-privilege-escalation
    • Windows Privilege Escalation
    • Windows Version and Configuration Cheatsheet
    • Basic Windows Commands
    • Managing Files and Folder Permissions
    • Understanding the ACL Entries
    • Booting Files
    • User Management Commands
    • Service Controller Utility Commands
    • Windows Firewall Management
    • Windows Registry Commands
    • Net Services Suite
    • User Enumeration
    • Network Enumeration
    • kernel exploit
    • MS10-059
    • Password Mining
      • SAM and SYSTEM files
      • NTDS.DIR Active Directory
      • FileZilla Server Password Recovery
      • Password in Registry
      • Password stored in service
      • PowerShell Command History
      • Password in Alternate Data Stream(ADS)
      • Unattended Install Files (Cleartext Passwords)
      • Web COnfiguration Files and Sensitive Data Discovery
      • Windows File Search For Credentials and Sensitive Data
      • Finding Wi-Fi SSID and Passwords on windows
      • Extracting Passwords from Sticky Notes
    • Impersonation and Potato Attacks
      • GodPotato exploit
    • Registry Exploitation Techniques
      • AlwaysInstalledEvevated Exploitation
      • Autorun Registry Persistence
      • Service Escalation via Registry
    • Exploitable Service Misconfigurations
      • Dynamic Link Library Hijacking (DLL Hijacking)
      • Insecure Service Permissions(binPath)
      • Insecure File Permission - Service Executable Files Path
      • Unquoted Service Path Vulnerability
    • Escalation Path via Windows Subsystem for linux(WSL)
    • Escalation Via RunAs
    • Privilege Escalation via startup application
    • UAC(User Account Control) Bypass via sdclt.exe and App Path Hijak
    • Mounting VHD and VHDX
    • Post Exploitation
    • ShutDown and Reboot Options in Windows
    • syllabus
  • Active Directory
    • Access Control Model
    • Ligolo-ng
    • Chisel
    • LDAP Enumeration
    • BloodHound
    • PowerView
    • PowerHuntShares
    • Kerberos Enumeration
    • Kerberos Attack
    • Impacket-GetNPUsers
    • Impacket-GetUserSPNs
    • Kerberoasting User Enumeration
    • NetBIOS and LLMNR Name poisioning
    • smbpasswd
    • AS-REP Roasting Attack
    • Kerberoasting v/s AS-REP
    • SMB relay attack
    • NetExec
    • Mimikatz usage and Execution
    • Kerberoasting with Mimikatz
    • Golden Ticket
    • Silver ticket
Powered by GitBook
On this page

Active Directory

Access Control ModelLigolo-ngChiselLDAP EnumerationBloodHoundPowerViewPowerHuntSharesKerberos EnumerationKerberos AttackImpacket-GetNPUsersImpacket-GetUserSPNsKerberoasting User EnumerationNetBIOS and LLMNR Name poisioningsmbpasswdAS-REP Roasting AttackKerberoasting v/s AS-REPSMB relay attackNetExecMimikatz usage and ExecutionKerberoasting with MimikatzGolden TicketSilver ticket
PrevioussyllabusNextAccess Control Model

Last updated 16 days ago