0Sec
Ctrlk
  • 🥷Whoami
  • 🔐Web_AppSec
    • 😀Reconnaissance
    • Features Abuse
    • Technologies
    • Information Disclosure
    • CSRF
    • CRLF Injection
    • Forgot Password
    • Account Takeover
    • LFI & RFI
    • OAuth Misconfiguration
    • Open Redirect
    • SQL injection
    • SSRF
    • Web Cache Deception
    • Web Cache Poisoning
    • Web AppSec Nots
    • Broken Link Injection
    • Checklist
    • Checklist 1.1
  • 🥷Network-pentest
    • Recon
    • Windows Privilege Escalation
    • Active Directory
      • AD Enumeration
      • AD Techniques
      • AD Cheat Sheet
    • Red Team Note
    • Notes
Powered by GitBook
On this page
  1. 🥷Network-pentest

Active Directory

ASREQ (Username + hash(TimeStamp) + Kerbtgt + SPN)

ASREP (ASREP + Username )

Resources

LogoGitHub - 0xDigimon/Cheat-Sheet---Active-Directory: This cheat sheet contains common enumeration and attack methods for Windows Active Directory with the use of powershell.GitHub
LogoCRTP/PowerViewMagic.md at main · 0xDigimon/CRTPGitHub
LogoGitHub - Integration-IT/Active-Directory-Exploitation-Cheat-Sheet: A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.GitHub
LogoGitHub - 0xDigimon/Active-Directory-Exploitation-Cheat-Sheet: A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.GitHub
LogoCRTP/PowerViewMagic.md at main · k3nundrum/CRTPGitHub
PreviousWindows Privilege EscalationNextAD Enumeration

Last updated 1 year ago