AD Pentesting Methodologies
Link for assistance: https://wadcoms.github.io/ and https://lolad-project.github.io/
PASSWORD ATTACKS, POST-EXPLOITATION AND PIVOTING EXAMPLE:
Then
Let’s say we have smb and winrm open. We will run it like this:
AD ENUMERATION WITH CREDENTIALS OR HAVE A SESSION OF OUR COMPROMISED USER EXAMPLE:
Last updated