Skip to main content

Recently Updated Pages

BloodHound

Active Directory Post Exploitation: Enumeration

1. Installation sudo apt install -y neo4j bloodhound 2. Setup sudo neo4j console & Navi...

Updated 4 months ago by 0xBEN

PowerView

Active Directory Post Exploitation: Enumeration

Overview A set of PowerShell functions that can be used to enumerate ActiveDirectory. Part of th...

Updated 4 months ago by 0xBEN

Passback Attacks (Internal/External)

Active Directory Initial Attack Vectors

What's the Flaw? Usually involves an unsecure device -- like a printer or multifunction device -...

Updated 4 months ago by 0xBEN

IPv6 DNS Spoofing (Internal)

Active Directory Initial Attack Vectors

Note: Network Environment This spoofing attack and works by sending a router announcement to mul...

Updated 4 months ago by 0xBEN

SMB Relay (Internal/External)

Active Directory Initial Attack Vectors

Note: Network Environment This attack works best in a flat network. However, as long as the atta...

Updated 4 months ago by 0xBEN

LLMNR Poisoning (Internal)

Active Directory Initial Attack Vectors

Note: Network Environment Given that LLMNR is a name resolution protocol that works on the Local...

Updated 4 months ago by 0xBEN

Computer Networking: MAC Addressing and ARP

PJPT & PNPT Study Group Lessons Session 2: Nov. 13, 2023

Media Access Control Address Identifies the physical network interface of a host Hexadecima...

Updated 4 months ago by 0xBEN

Computer Networking: Encapsulation and Decapsulation

PJPT & PNPT Study Group Lessons Session 2: Nov. 13, 2023

TCP/IP Model vs. OSI Model TCP/IP Model The sender sends from Layer 4 down to Layer 1The recipi...

Updated 4 months ago by 0xBEN

Installing Wine and Wine Dependencies

Kali Optimizations

Considerations I urge you to consider taking a snapshot of your Kali instance at its current sta...

Updated 4 months ago by 0xBEN

Dumping Passwords from Windows Credential Manager

Active Directory Post Exploitation: Attacks

Credential Enumeration cmdkey /list In reverse shells, I have noticed that it's impossible to s...

Updated 4 months ago by 0xBEN

Spawn Processes as Other Users

Active Directory Post Exploitation: Attacks

RunasCs.exe Project GitHub https://github.com/antonioCoco/RunasCs/releases Example Usage Spaw...

Updated 4 months ago by 0xBEN

Pass the Key

Active Directory Post Exploitation: Attacks

Kerberos Encryption Keys Policies on the domain controller will dictate which encryption algorit...

Updated 4 months ago by 0xBEN

Pass the Ticket

Active Directory Post Exploitation: Attacks

Anatomy of a Kerberos Ticket [0;97d82]-2-0-40e10000-t2_felicia.dean@krbtgt-ZA.TRYHACKME.COM.kirb...

Updated 4 months ago by 0xBEN

DCSync

Active Directory Post Exploitation: Attacks

DCSync Overview DC Sync is a legitimate function of Active Directory environments where a domain...

Updated 4 months ago by 0xBEN

Password & Credential Brute Force

Active Directory Post Exploitation: Attacks

User Emumeration You have enumerated users with one of the methods defined here: CrackMapExec...

Updated 4 months ago by 0xBEN

Impacket-Addcomputer

Active Directory Post Exploitation: Attacks

When to Use Could be used post-compromise upon enumerating the ms-DS-MachineAccountQuota policy....

Updated 4 months ago by 0xBEN

ZeroLogon

Active Directory Post Exploitation: Attacks

Caution This can potentially break a domain controller, due the fact that this attack temporaril...

Updated 4 months ago by 0xBEN

PrintNightmare

Active Directory Post Exploitation: Attacks

Local Privilege Escalation https://github.com/calebstewart/CVE-2021-1675

Updated 4 months ago by 0xBEN

Group Policy Preferences (GPP)

Active Directory Post Exploitation: Attacks

Overview GPP allows admins to create policies with embedded credentials. The credentials are enc...

Updated 4 months ago by 0xBEN

Kerberoasting

Active Directory Post Exploitation: Attacks

Overview The attacker uses a known username and password of a user on a domain. A typical Kerbe...

Updated 4 months ago by 0xBEN