⌨️
Penetration testing & ethical hacking concepts
CtrlK
  • Introduction
  • 💿Virtual Machines
    • VirtualBox
    • VMware
  • 🕵️OSINT
    • What is OSINT?
    • Google dorks
    • Metadata
    • Social media
  • Tools
  • 😨Social Engineering
    • What is social engineering?
    • 7 tricks of social engineering
    • Email phishing
    • Typosquatting
    • Compiled resources
  • 😈MitM attack
    • What is MitM attack?
    • ARP spoof/poison
    • DNS spoof/poison
    • HTTP MitM attack
    • ICMP redirect attack
    • DHCP spoofing
    • Evil twin attack
    • Experiment (guest network)
    • Compiled resources
  • 🔌UPnP exploitation
    • What is UPnP?
    • What is SSDP?
    • IGD functions
    • LAN devices
    • Compiled resources
  • Network Reconnaissance & Attacks
    • What is network recon & attacks?
  • 1️⃣ Network live host discovery
    • What is network live host discovery?
    • nmap
    • arp-scan
    • masscan
  • 2️⃣ Network port scan/services enumeration
    • What is network port scan/services enumeration?
    • nmap
    • netcat
    • rustscan
  • 3️⃣ Network services vulnerability scanning & exploitation
    • What is network vulnerability scanning/exploitation?
    • 20/21 ~ FTP
    • 22 ~ SSH
    • 25 ~ SMTP
    • 53 ~ DNS
    • 80/443 ~ HTTP/HTTPS
    • 88 ~ Kerberos
    • 110 ~ POP3
    • 111/2049 ~ RPC/NFS
    • 139/445 ~ SMB
    • 143 ~ IMAP
    • 161 ~ SNMP
    • 3389 ~ RDP
  • Vulnerability & exploitation
    • Database
    • Metasploit
    • Msfvenom
  • Misconfigurations
  • Binary Exploitation
    • Assembly
    • Computer architecture
    • Buffer Overflow
    • Tools
  • Web Exploitation
    • Introduction
    • Injection attacks
    • Server-Side attacks
    • Client-Side attacks
    • HTTP Request Smuggling
    • Web Content Discovery
    • Authentication/session management
  • Webshell
  • Web API pentesting
  • OWASP
  • General web knowledge
  • Framework specific
  • Methodology
  • 🛣️Attacks on routing protocols
    • What are attacks on routing protocols?
    • BGP hijacking
  • 🏕️To explore
    • MQTT
    • Routersploit
    • DNS rebinding attack
    • LLMNR/mDNS poisoning
  • 👤Anonymity
    • VPN
    • Proxychains
    • TOR
    • Obfuscation
  • Credentials brute-force/cracking
    • Introduction
    • Windows SAM database
    • Dictionary attack
    • Rainbow attack
    • Tools
  • Post-exploitation
    • Gaining shell
    • Repository
    • Lateral movement & Pivoting
  • Privilege escalation
    • Linux
    • Windows
  • Ⓜ️MITRE ATT&CK
    • Introduction
    • OS Credential Dumping (T1003)
  • 🧰Tools/services
    • Introduction
    • Web application pentesting
    • Information gathering/reconnaissance
    • Network recon & attacks
    • General
    • Wordlists
  • Professional report writing
    • Report template
  • Tasks on-the-go
  • Practice
  • Forensics
    • Steganography
  • Operational Security (OpSec)
    • Hardening
  • Safe document viewer
  • Challenge write-ups
    • CTFs/Labs/Challenges compilation
    • OverTheWire
    • TryHackMe
    • PicoCTF
    • HackTheBox
    • VulnHub
    • OWASP
  • AI prompt
    • ChatGPT
  • Windows/Active Directory
    • Introduction
    • Initial Access
    • Enumeration
    • Lateral movement & Pivoting
    • Exploitation techniques
      • Permission delegation
      • Kerberos delegation
      • Exploiting authentication relay ~ Print Spooler Service
      • Group Policy Objects (GPOs)
      • Exploiting Certificates
      • Exploiting domain trusts
      • Kerberoasting (TGS-REP roasting)
      • AS-REP roasting
    • Credentials harvesting
    • General
    • Tools
    • Methodology
    • Experimentations
  • Reverse Engineering
    • Resources
  • 🐉OSCP
    • Resources
    • Practice labs
Powered by GitBook
On this page
  1. Windows/Active Directory

Exploitation techniques

Permission delegationKerberos delegationExploiting authentication relay ~ Print Spooler ServiceGroup Policy Objects (GPOs)Exploiting CertificatesExploiting domain trustsKerberoasting (TGS-REP roasting)AS-REP roasting
PreviousRDP hijackingNextPermission delegation