Active Directory Methodology
Understanding Active Directory
Key Concepts
Active Directory Domain Services (AD DS)
Pentesting Active Directory: Methodology and Techniques
Reconnaissance Without Credentials or Sessions
Commands:
User Enumeration
Commands:
LLMNR/NBT-NS Poisoning
Commands:
NTLM Relay
Commands:
Credential Theft
Commands:
Enumerating Active Directory with Credentials or Sessions
Commands:
Kerberoasting
Commands:
Remote Connections (RDP, SSH, FTP, Win-RM)
Commands:
Current Session Tickets
Commands:
Looking for Credentials in Computer Shares
Commands:
Specific Exploits
CVE-2021โ1675 (PrintNightmare)
Commands:
CVE-2021โ34527 (PrintNightmare)
Commands:
Step-by-Step Guides for Key Pentesting Techniques
Privilege Escalation on Active Directory with Privileged Credentials/Session
Pass the Hash
Over Pass the Hash/Pass the Key
Pass the Ticket
Credentials Reuse
MSSQL Abuse & Trusted Links
Unconstrained Delegation
Constrained Delegation
Resource-based Constrained Delegation
ACLs Abuse
Printer Spooler Service Abuse
Third-Party Sessions Abuse
LAPS
Certificate Theft
Certificate Templates Abuse
Post-Exploitation with High Privilege Account
Dumping Domain Credentials
Privilege Escalation as Persistence
Silver Ticket
Golden Ticket
Diamond Ticket
Certificates Account Persistence
Certificates Domain Persistence
AdminSDHolder Group
DSRM Credentials
ACL Persistence
Security Descriptors
Skeleton Key
Custom SSP
DCShadow
LAPS Persistence
Forest Privilege Escalation โ Domain Trusts
Tips for Beginners
Common Mistakes to Avoid
Challenges and Solutions
Last updated