mrci0x1
CtrlK
H1HTB
  • #️whoami
  • WEB APP
    • Bug Hunting
      • Bypass of Username Policy: Breaking the Rules with a Simple Trick
      • Sensitive Data Exposure in a Moodle Config File
      • Exposed Sensitive Logs and SQL Queries Revealing User Data
  • Network
    • Pivoting, Tunneling, and Port Forwarding
      • Port Forwarding
      • Socat
      • Plink, Sshuttle, Rpivot, and Netsh Unleashed
      • Dnscat2, Chisel, Ptunnel-ng, and SocksOverRDP Tunneling Techniques
    • Active Directory Enumeration and Attacks
      • Tools
      • External and Internal Enumeration
      • LLMNR/NBT-NS & Spraying for AD Access
      • Internal Password Spraying Attack
      • Credentialed Enumeration
      • Enumerating Security Controls
      • Kerberoasting Attack
      • ACE the Hole
      • ACL Abuse
      • Privileged Access
      • Kerberos Attack Methods with Double Hop Workarounds
      • Bleeding Edge Vulnerabilities
      • Miscellaneous Misconfigurations
      • Trusting
    • Windows Privilege Escalation
      • Initial Assessment
      • User Privileges
      • Group Privileges
      • Attacking the OS
      • Credential Theft
      • Citrix Breakout
      • Additional Techniques
    • HTB
      • Boxes
        • Fluffy
        • TombWatcher
Powered by GitBook
On this page
  1. Network

Active Directory Enumeration and Attacks

This blog is for people who already understand the basics of Active Directory. It assumes knowledge of things like domains, domain controllers, users, groups, OUs, and Kerberos authentication, without explaining them in detail. If these terms are new, it’s best to review basic guides first to get the most from the advanced topics covered here.

PreviousDnscat2, Chisel, Ptunnel-ng, and SocksOverRDP Tunneling TechniquesNextTools

Last updated 1 month ago