Pentest Notes
Ctrlk
  • About
  • Notes
    • Methodologies & Tools
      • Scanning & Enumeration
      • Active Directory
        • Housekeeping
        • DNS Recon
        • Finding Users
        • Client Side Attacks
        • PowerShell Domain Enumeration
        • Roasting
        • Mimikatz
        • Credential Attacks
        • Bloodhound
        • Persistence
        • Group Policy Attack Tools
        • Service Account Exploits
        • Delegation
        • Cheatsheets
        • Tool Repos
      • Privilege Escalation
      • Web
      • Network Pivoting
      • Tools
      • File Transfer
      • External
Powered by GitBook
On this page
  1. Notes
  2. Methodologies & Tools
  3. Active Directory

Cheatsheets

https://raw.githubusercontent.com/Orange-Cyberdefense/arsenal/master/mindmap/pentest_ad_dark.png

https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet#url-file-attacks

https://gist.github.com/ssstonebraker/a1964b2f20acc8edb239409b6c4906ce

https://github.com/blackc03r/OSCP-Cheatsheets/blob/master/offensive-security-experiments/active-directory-kerberos-abuse/abusing-active-directory-acls-aces.md

https://akimbocore.com/article/privilege-escalation-extracting-passwords-with-mimikatz/

https://lukasec.ch/posts/oscpadcheatsheet.html

https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/abusing-active-directory-acls-aces

https://kashz.gitbook.io/kashz-jewels/active-directory

https://book.hacktricks.xyz/windows-hardening/active-directory-methodology

https://blog.harmj0y.net/activedirectory/ (The AD OG)

https://themayor.notion.site/53512dc072c241589fc45c577ccea2ee?v=7b908e7e76a9416f98f40d9d3843d3cb (Powershell)

https://themayor.notion.site/341cf3705cc64752b466046584de45b8?v=4f2173ad749249b293a89ab5391805ec (CMD)

https://amandinegh.gitbook.io/cyberadventure/active-directory/

https://github.com/dievus/Internal-Pentest-Playbook

https://www.thehacker.recipes/ad/

PreviousDelegationNextTool Repos

Last updated 3 years ago