Skip to content

Latest commit

 

History

History
42 lines (40 loc) · 4.88 KB

articles.md

File metadata and controls

42 lines (40 loc) · 4.88 KB

Not The Hidden Wiki

Learn Active Directory


  1. Active Directory Methodology - link
  2. Red Team Notes - link
  3. AD Home Lab - link
  4. Attacking Active Directory - link
  5. Active Directory Methodology - link
  6. Active Directory pentesting: cheatsheet and beginner guide - link
  7. Active Directory Exploitation Cheat Sheet - link
  8. Active Directory Exploitation Cheat Sheet - link
  9. Active Directory MindMap - link
  10. Enumeration MindMap - link
  11. Alternative ways to Pass the Hash (PtH) - link
  12. Kerberos cheatsheet - link
  13. Critical Unauthenticated RCE Vulnerability in MSMQ Service - link
  14. Windows File Transfer CheatSheet - link
  15. Playing with Relayed Credentials - link
  16. Diving into Pre-Created Computer Accounts - link
  17. Poc’ing Beyond Domain Admin - Part 1 - link
  18. The worst of both worlds: Combining NTLM Relaying and Kerberos delegation - link
  19. Combining NTLM Relaying and Kerberos delegation - link
  20. A comprehensive guide on relaying anno 2022 - link
  21. “Relaying” Kerberos - Having fun with unconstrained delegation - link
  22. Keeping Up with the NTLM Relay - link
  23. Relay - link
  24. A cheat sheet that contains common enumeration and attack methods for Windows Active Directory - link
  25. Active Directory Enumeration for Red Teams - link
  26. Do Not Trust This Group Policy - link
  27. CVE-2024-20656 – Local Privilege Escalation in the VSStandardCollectorService150 Service - link
  28. Most common Active Directory misconfigurations and default settings that put your organization at risk - link
  29. Fantastic Windows Logon types and Where to Find Credentials in Them - link
  30. GPOddity: exploiting Active Directory GPOs through NTLM relaying - link
  31. External Trusts Are Evil - link
  32. LDAP Queries for Offensive and Defensive Operations - link
  33. DES Is Useful... Sometimes - link
  34. New Attack Paths? AS Requested Service Tickets - link
  35. Abusing Windows’ tokens to compromise Active Directory without touching LSASS - link
  36. A notes page focusing on quick wins in Active Directory for red team activities. - link
  37. Active Directory Pentest - link