📃
Internal Pentest
search
⌘Ctrlk
📃
Internal Pentest
  • Internal pentest
    • Active Directory
      • Core Concepts
      • Reconnaissance
      • Initial attack vectors
      • Post-Compromise Enumeration
      • Post-Compromise Attacks
      • MISC
  • Cloud pentesting
    • Microsoft AZURE
    • AWS
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Internal pentestchevron-right
  2. Active Directory

MISC

This page contains a collection of interesting links to cheat sheets, an assembly of articles ... that are useful as i covered only the basics

The well known adsecurity blog :

Active Directory & Azure AD/Entra ID Security – Active Directory & Azure AD/Entra ID: Enterprise Security, Methods to Secure Active Directory, Attack Methods & Effective Defenses, PowerShell, Tech Notes, & Geek Trivia…adsecurity.orgchevron-right

A soup of AD TTPs :

https://0xsp.com/ad-attack-or-defense/ad-ttps-list0xsp.comchevron-right

And another soup :

LogoActive Directory & Kerberos Abuse | Red Team Notesired.teamchevron-right

Lydéric Lefebvrearrow-up-right @lydericlefebvre cheat sheet :

LogoIntroduction | cheatsheetlydericlefebvre.gitbook.iochevron-right

Harmj0y (a real "joy" to read the articles here):

Logoharmj0yharmj0ychevron-right

dirk-jan blog :

dirkjanm.iodirkjanm.iochevron-right

elad shamir blogs:

Elad ShamirElad Shamirchevron-right

Sheaningans labs :

Shenanigans LabsShenanigans Labschevron-right

PreviousOther Lateral movements and attackschevron-leftNextMicrosoft AZUREchevron-right

Last updated 5 years ago