Skip to content

Active directory attack

Nirvana EL edited this page Dec 11, 2023 · 6 revisions

review of Active Directory

Active Directory Attack

  • kerberoasting
  • Local loop Multicast Name Resolution (LLMNR)
  • Default Credentials
  • Privilege Escalation
  • BloodHound Reconnaissane
  • Password Spraying
  • Pass-the-hash with Mimikatz
  • Hard-coded Credentials
  • LDAP Reconnaissance
  • NTDS.dit Extraction

  • some useful essay:

Active Directory Attacks and Security Measures


active-directory-a-comprehensive-exploration-of-functionality-and-advanced-security-paradigms


GOAd Active directory Lab :

  • Password reuse between computer (PTH)
  • Spray User = Password
  • Password in description
  • SMB share anonymous
  • SMB not signed
  • Responder
  • Zerologon
  • Windows defender
  • ASREPRoast
  • Kerberoasting
  • AD Acl abuse
  • Unconstraint delegation
  • Ntlm relay
  • Constrained delegation
  • Install MSSQL
  • MSSQL trusted link
  • MSSQL impersonate
  • Install IIS
  • Upload asp app
  • Multiples forest
  • Anonymous RPC user listing
  • Child parent domain
  • Generate certificate and enable ldaps
  • ADCS - ESC 1/2/3/8
  • Certifry
  • Samaccountname/nopac
  • Petitpotam unauthent
  • Printerbug
  • Drop the mic
  • Shadow credentials
  • Mitm6
  • Add LAPS
  • GPO abuse
  • Add Webdav
  • Add RDP bot
  • Add full proxmox integration
  • Add Gmsa
  • Add PPL
  • Add Credential Guard
  • Add Applocker
  • Zone transfert
  • Wsus
  • Sccm
  • Exchange

Clone this wiki locally