Bebzounette
Ctrlk
  • Bebzounettes
  • Active Directory
    • Recon
    • Lateral movement
      • Code execution
      • Credentials
        • Finding
        • Dumping
          • SAM Base
          • LSA Secrets
          • LSASS Process
          • DPAPI secrets
          • NTDS.DIT
          • Group Policy Preferences
          • User description
        • Impersonnification
        • Cracking
      • Coercition
      • Relay
      • Kerberos
      • GPOs
      • DACL
      • Certificates Service (AD-CS)
      • Privileged Groups
      • Built-in Misconfigurations
      • CVEs
    • 🚧Persistance & Exfiltration
    • 🚧Cross Trust Attack
    • References
  • Systems
    • 🚧Windows
    • 🚧Linux
    • 🚧Mobile & IOT
  • Web
    • CheckList & Méthodologie
    • 🚧Pentest API
    • 🚧Wordpress
    • 🚧Jenkins
    • 🚧IIS Server
  • Applicatives vulnerabilities
    • Buffer-Overflow
  • Thick Client
    • Thick Client Methodology
  • Wireless Security
    • WIFI
    • 🚧ZIGBEE
    • 🚧ZWAVE
    • GNU-RADIO
  • Network
    • Modèle OSI & Adressage IPV4
    • 🚧DOS & DDOS
    • VOIP
  • Physical Access
    • 🚧Lock Picking
    • Matériels
    • Accès physique à un ordinateur
  • Forensic
    • Outils de Forensic
  • Information gathering
    • Scans
  • Services
    • Echo - 7
    • FTP - 21
    • SSH - 22
    • Telnet - 23
    • SMTP - 25/465/587
    • Whois - 43
    • Finger - 79
    • POP3 - 110
    • NTP - 123
    • MSRPC - 135/593
    • IMAP - 143
    • SMB - 445
    • RDP -3389
    • References
  • Github Repos
    • Repos Github
  • Blog
  • Contact
Powered by GitBook
On this page

Was this helpful?

  1. Active Directory
  2. Lateral movement
  3. Credentials

Dumping

SAM BaseLSA SecretsLSASS ProcessDPAPI secretsNTDS.DITGroup Policy PreferencesUser description
PreviousSprayingNextSAM Base

Last updated 3 years ago

Was this helpful?