📃
Internal Pentest
CtrlK
  • Internal pentest
    • Active Directory
      • Core Concepts
        • Domain Controllers
        • AD DS Data Store
        • AD DS Schema
        • Attributes
        • Containers and Leaves
        • Object Names and Identities
        • Directory Partitions/Naming Contexts
        • Oraganizational Units, Namespaces, domains, domain trees, forests and trust relationships
      • Reconnaissance
      • Initial attack vectors
        • LLMNR/NBT-NS Poisoning
          • Intercept and Hashcat
          • SMB relay
        • IPv6 Attacks
          • Basic attack
          • Combining NTLM Relaying and Kerberos delegation
          • Other attack vectors and strategies
        • ASREPRoast
        • ADCS + PetitPotal NTLM Relay
      • Post-Compromise Enumeration
        • Powerview
        • PingCastle
        • BloodHound
        • Other
      • Post-Compromise Attacks
        • Pass the Password
        • Pass the hash
        • Token impersonation
        • ASREPRoast
        • Kerberoasting
        • DCSync
        • DCShadow
        • GPP attacks
        • Golden tickets
        • PrintNightmare
        • Other Lateral movements and attacks
      • MISC
  • Cloud pentesting
    • Microsoft AZURE
      • Definitions and fundamentals
    • AWS
Powered by GitBook
On this page

Was this helpful?

  1. Internal pentest
  2. Active Directory

MISC

This page contains a collection of interesting links to cheat sheets, an assembly of articles ... that are useful as i covered only the basics

The well known adsecurity blog :

Active Directory & Azure AD/Entra ID Security – Active Directory & Azure AD/Entra ID: Enterprise Security, Methods to Secure Active Directory, Attack Methods & Effective Defenses, PowerShell, Tech Notes, & Geek Trivia…adsecurity.org

A soup of AD TTPs :

https://0xsp.com/ad-attack-or-defense/ad-ttps-list0xsp.com

And another soup :

LogoActive Directory & Kerberos Abuse | Red Team Notesired.team

Lydéric Lefebvre @lydericlefebvre cheat sheet :

LogoIntroduction | cheatsheetlydericlefebvre.gitbook.io

Harmj0y (a real "joy" to read the articles here):

http://blog.harmj0y.net/blog.harmj0y.net

dirk-jan blog :

dirkjanm.iodirkjanm.io

elad shamir blogs:

Elad ShamirElad Shamir

Sheaningans labs :

Shenanigans LabsShenanigans Labs

PreviousOther Lateral movements and attacksNextMicrosoft AZURE

Last updated 5 years ago

Was this helpful?