The value of a hacked system is determined by the weight of the actual data stored in it and how you can use it for your own purposes.
Приветствую тебя user_name.
• Exploitation is a sequence of actions that helps an attacker gain access to the system under investigation by exploiting a vulnerability or configuration error. Today, I will share with you a link to a great Cheat Sheet for exploiting win #AD .
What does the guide include:
•PowerShell AMSI bypass;
•PowerShell one-liners;
•Enumerations;
•AD Enumeration using PowerView;
•AppLocker;
•Limited PowerShell language mode;
•LAPS;
•Lateral Movement;
•Lateral movement with PowerView;
•Bloodhound;
•Kerberoasting;
•AS-REP roasting;
•Token Manipulation;
•Lateral movement with Rubeus;
•Lateral movement with Mimikatz;
•Execution of a command with scheduled tasks;
•Execution of commands using WMI;
•Execution of commands using PowerShell Remoting;
•Unlimited delegation;
•Limited delegation;
•Limited delegation based on resources;
•Abuse of trust in the domain;
•MSSQL and lateral movement;
•Group policies and lateral movement;
•Privilege Escalation;
•PowerUp;
•UAC Bypass;
•Persistence;
•Startup folder;
•Domain Persistence;
•Mimikatz skeleton key attack;
•DCSync rights using PowerView;
•Domain Controller DSRM admin;
•Changing security descriptors for remote access to WMI;
•Changing security descriptors for PowerShell remote access;
•Changing DC registry security descriptors for remote hash extraction using DAMP;
•DCShadow;
•Post-exploitation;
•LSASS protection;
•Dump credentials using Mimikatz;
•Abuse of DPAPI using Mimikatz;
•Dumping secrets without Mimikatz;
•Windows Defender evasion;
•Chisel proxying;
•Juicy files;
YourSÈ #AD #Mimikatz #BloodHound #AMSI #PowerView #PowerShell #Пентест
