Active Directory & Kerberos Abuse

Active Directory & Kerberos Abuse

A collection of techniques that exploit and abuse Active Directory, Kerberos authentication, Domain Controllers and similar matters.

Here are the articles in this section:From Domain Admin to Enterprise AdminExplore Parent-Child Domain Trust Relationships and abuse it for Privilege EscalationKerberoastingCredential AccessKerberos: Golden TicketsPersistence and Privilege Escalation with Golden Kerberots ticketsKerberos: Silver TicketsCredential AccessAS-REP RoastingKerberoasting: Requesting RC4 Encrypted TGS when AES is EnabledKerberos Unconstrained DelegationKerberos Constrained DelegationKerberos Resource-based Constrained Delegation: Computer Object Take OverDomain Compromise via DC Print Server and Kerberos DelegationDCShadow - Becoming a Rogue Domain Controllerarrow-up-rightDCSync: Dump Password Hashes from Domain Controllerarrow-up-rightPowerView: Active Directory Enumerationarrow-up-rightAbusing Active Directory ACLs/ACEsarrow-up-rightPrivileged Accounts and Token Privilegesarrow-up-rightFrom DnsAdmins to SYSTEM to Domain Compromisearrow-up-rightPass the Hash with Machine$ Accountsarrow-up-rightBloodHound with Kali Linux: 101arrow-up-rightBackdooring AdminSDHolder for Persistencearrow-up-rightActive Directory Enumeration with AD Module without RSAT or Admin Privilegesarrow-up-rightEnumerating AD Object Permissions with dsaclsEnumeration, living off the landarrow-up-rightActive Directory Password Sprayingarrow-up-rightActive Directory Lab with Hyper-V and PowerShellarrow-up-right

最后更新于

这有帮助吗?