Methodology
search
⌘Ctrlk
Methodology
  • πŸ˜ƒWelcome
    • Bullet Proof Strategy
    • πŸ‘οΈEnumeration
    • πŸ‘ΊExploitation
    • πŸ‘½Privilege Escalation
    • πŸ’€Elevated Post Exploitation
    • 🟦Active Directory
      • Attack Vectors
      • Post Exploitation - Enumeration
      • Exploitation
        • Kerberoasting
        • GMSA Password Read
        • Account Operators
        • WriteDACL over DCSync
        • GenericWrite GPO
        • PS-Remoting
        • LAPS Password Read
        • Abusing ACLs
        • Groups.xml
        • Azure AD Sync Dump
        • AD Recycle Bin Group
        • Get-ChangesAll
        • WriteOwner Over Domain Admins
        • Allowed to Delegate To:
        • Force Change Password
      • Resources
    • 😎Walkthroughs
    • Cert Pictures :)
    • 🐍Python Lessons
    • 🐚Bash Lessons
    • C# Programming
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. πŸ˜ƒWelcomechevron-right
  2. 🟦Active Directory

Exploitation

Kerberoastingchevron-rightGMSA Password Readchevron-rightAccount Operatorschevron-rightWriteDACL over DCSyncchevron-rightGenericWrite GPOchevron-rightPS-Remotingchevron-rightLAPS Password Readchevron-rightAbusing ACLschevron-rightGroups.xmlchevron-rightAzure AD Sync Dumpchevron-rightAD Recycle Bin Groupchevron-rightGet-ChangesAllchevron-rightWriteOwner Over Domain Adminschevron-rightAllowed to Delegate To:chevron-rightForce Change Passwordchevron-right
PreviousEnumeration - Powerviewchevron-leftNextKerberoastingchevron-right

Last updated 3 years ago