πŸ§‘β€πŸ’»
B00t2R00t
search
⌘Ctrlk
πŸ§‘β€πŸ’»
B00t2R00t
  • README
  • LICENSE
  • Active Directory Penetration Testing
    • ACLs\ACEs Permissions
    • Active Directory Certificate Services (ADCS)
    • Azure AD
    • Domain Admin Access
    • Kerberos Delegation
    • Lateral Movement
    • Linux Active Directory
    • MITM Listen and Relay
    • Microsoft Endpoint Configuration Manager (MECM)
    • Mindmaps
    • Mitigations
    • Persistence
    • Privilege Escalation
    • System\Admin Access
      • Credentials Extraction
      • Various python tools to dump credentials locally
      • Various python tools to dump credentials remotely
      • GPPPassword and GPP Autologin
      • Hybrid Environment (Azure AD Connect)
      • RDP Session Impersonation
      • Token Manipulation
      • Credential Extraction
      • Stored Credentials
    • Trust Relationship
    • Enumeration
    • Exploitation
  • Artificial Intelligence (AI) Penetration Testing
  • TODO LATER:
  • CVE
  • Cloud Penetration Testing
  • Data Lake Penetration Testing
  • Exploit Development
  • Methodology
  • Network Penetration Testing
  • Pivoting
  • Web Application Penetration Testing
  • Wireless Penetration Testing
  • Miscellaneous
  • Privilege Escalation
  • Red Teaming
  • Tools
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Active Directory Penetration Testing

System\Admin Access

Credentials Extractionchevron-rightVarious python tools to dump credentials locallychevron-rightVarious python tools to dump credentials remotelychevron-rightGPPPassword and GPP Autologinchevron-rightHybrid Environment (Azure AD Connect)chevron-rightRDP Session Impersonationchevron-rightToken Manipulationchevron-rightCredential Extractionchevron-rightStored Credentialschevron-right
PreviousServer Operators Active Directory Security Groupchevron-leftNextCredentials Extractionchevron-right

Last updated 8 months ago