Methodology
Ctrlk
  • ๐Ÿ˜ƒWelcome
    • Bullet Proof Strategy
    • ๐Ÿ‘๏ธEnumeration
    • ๐Ÿ‘บExploitation
    • ๐Ÿ‘ฝPrivilege Escalation
    • ๐Ÿ’€Elevated Post Exploitation
    • ๐ŸŸฆActive Directory
      • Attack Vectors
      • Post Exploitation - Enumeration
      • Exploitation
        • Kerberoasting
        • GMSA Password Read
        • Account Operators
        • WriteDACL over DCSync
        • GenericWrite GPO
        • PS-Remoting
        • LAPS Password Read
        • Abusing ACLs
        • Groups.xml
        • Azure AD Sync Dump
        • AD Recycle Bin Group
        • Get-ChangesAll
        • WriteOwner Over Domain Admins
        • Allowed to Delegate To:
        • Force Change Password
      • Resources
    • ๐Ÿ˜ŽWalkthroughs
    • Cert Pictures :)
    • ๐ŸPython Lessons
    • ๐ŸšBash Lessons
    • C# Programming
Powered by GitBook
On this page
  1. ๐Ÿ˜ƒWelcome
  2. ๐ŸŸฆActive Directory

Exploitation

KerberoastingGMSA Password ReadAccount OperatorsWriteDACL over DCSyncGenericWrite GPOPS-RemotingLAPS Password ReadAbusing ACLsGroups.xmlAzure AD Sync DumpAD Recycle Bin GroupGet-ChangesAllWriteOwner Over Domain AdminsAllowed to Delegate To:Force Change Password
PreviousEnumeration - PowerviewNextKerberoasting

Last updated 3 years ago