πŸ§‘β€πŸ’»
B00t2R00t
search
⌘Ctrlk
πŸ§‘β€πŸ’»
B00t2R00t
  • README
  • LICENSE
  • Active Directory Penetration Testing
    • ACLs\ACEs Permissions
    • Active Directory Certificate Services (ADCS)
    • Azure AD
    • Domain Admin Access
    • Kerberos Delegation
    • Lateral Movement
    • Linux Active Directory
    • MITM Listen and Relay
    • Microsoft Endpoint Configuration Manager (MECM)
    • Mindmaps
    • Mitigations
    • Persistence
    • Privilege Escalation
    • System\Admin Access
      • Credentials Extraction
      • Various python tools to dump credentials locally
      • Various python tools to dump credentials remotely
      • GPPPassword and GPP Autologin
      • Hybrid Environment (Azure AD Connect)
      • RDP Session Impersonation
      • Token Manipulation
      • Credential Extraction
        • Cached Credentials
        • Extract DPAPI and Credentials Vault
        • Extract Credentials from LSA
        • LSASS
        • Pass-the-Challenge
        • RunAsPPL Bypass
        • Extract Credentials from SAM
      • Stored Credentials
    • Trust Relationship
    • Enumeration
    • Exploitation
  • Artificial Intelligence (AI) Penetration Testing
  • TODO LATER:
  • CVE
  • Cloud Penetration Testing
  • Data Lake Penetration Testing
  • Exploit Development
  • Methodology
  • Network Penetration Testing
  • Pivoting
  • Web Application Penetration Testing
  • Wireless Penetration Testing
  • Miscellaneous
  • Privilege Escalation
  • Red Teaming
  • Tools
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Active Directory Penetration Testingchevron-right
  2. System\Admin Access

Credential Extraction

Cached Credentialschevron-rightExtract DPAPI and Credentials Vaultchevron-rightExtract Credentials from LSAchevron-rightLSASSchevron-rightPass-the-Challengechevron-rightRunAsPPL Bypasschevron-rightExtract Credentials from SAMchevron-right
PreviousToken Manipulationchevron-leftNextCached Credentialschevron-right

Last updated 8 months ago