Bebzounette
CtrlK
  • Bebzounettes
  • Active Directory
    • Recon
    • Lateral movement
      • Code execution
      • Credentials
      • Coercition
      • Relay
      • Kerberos
        • Kerberoasting
        • AS-REP Roasting
        • 🚧Pass the Hash/Ticket
        • 🚧MSSQL Trusted Links
        • Forged Tickets
        • 🚧Delegations
      • GPOs
      • DACL
      • Certificates Service (AD-CS)
      • Privileged Groups
      • Built-in Misconfigurations
      • CVEs
    • 🚧Persistance & Exfiltration
    • 🚧Cross Trust Attack
    • References
  • Systems
    • 🚧Windows
    • 🚧Linux
    • 🚧Mobile & IOT
  • Web
    • CheckList & Méthodologie
    • 🚧Pentest API
    • 🚧Wordpress
    • 🚧Jenkins
    • 🚧IIS Server
  • Applicatives vulnerabilities
    • Buffer-Overflow
  • Thick Client
    • Thick Client Methodology
  • Wireless Security
    • WIFI
    • 🚧ZIGBEE
    • 🚧ZWAVE
    • GNU-RADIO
  • Network
    • Modèle OSI & Adressage IPV4
    • 🚧DOS & DDOS
    • VOIP
  • Physical Access
    • 🚧Lock Picking
    • Matériels
    • Accès physique à un ordinateur
  • Forensic
    • Outils de Forensic
  • Information gathering
    • Scans
  • Services
    • Echo - 7
    • FTP - 21
    • SSH - 22
    • Telnet - 23
    • SMTP - 25/465/587
    • Whois - 43
    • Finger - 79
    • POP3 - 110
    • NTP - 123
    • MSRPC - 135/593
    • IMAP - 143
    • SMB - 445
    • RDP -3389
    • References
  • Github Repos
    • Repos Github
  • Blog
  • Contact
Powered by GitBook
On this page

Was this helpful?

  1. Active Directory
  2. Lateral movement

Kerberos

KerberoastingAS-REP Roasting🚧Pass the Hash/Ticket🚧MSSQL Trusted LinksForged Tickets🚧Delegations
PreviousRelayNextKerberoasting

Last updated 3 years ago

Was this helpful?