The Pentesting Guide
Twitter
Blog
Search
⌃K
Links
The Pentesting Guide
ℹ
0 - Pre-Engagement
🔍
1 - Information Gathering
Passive (OSINT)
Active
💣
2 - Exploitation
Brute Forcing
WEB
WIFI
HUMINT
BoF - Windows(x86)
Active Directory
Kerberos
GPOs
Certificates
LAPS
Domain Trusts
👿
3 - Post Exploitation
File transfer
Shells
Situational Awareness
General
Local Privilege Escalation
Persistance
Cracking
Pivoting
Lateral Movement
WIFI
📓
4 - Report
🧹
5 - House cleaning
Powered By
GitBook
Active Directory
Introduction
This section contains some exploiting techniques on Active directory environments.
Previous
BoF - Windows(x86)
Next
Kerberos
Last modified
3mo ago