Exploitation is a sequence of actions that helps an attacker gain access to a target system by exploiting a vulnerability or configuration error. Links to excellent cheatsheets for exploiting win #AD
What does the guide include:
•PowerShell AMSI bypass;
•PowerShell one-liners;
•Enumeration;
•AD Enumeration using PowerView;
•AppLocker;
•PowerShell limited language mode;
•LAPS;
•Lateral Movement;
•Lateral movement using PowerView;
•BloodHound;
•Kerberoasting;
•AS-REP roasting;
•Token Manipulation;
•Lateral movement using Rubeus;
•Lateral movement using Mimikatz;
•Execute a command with scheduled tasks;
•Executing commands using WMI;
•Executing commands using PowerShell Remoting;
•Unlimited delegation;
•Limited delegation;
•Resource-based limited delegation;
•Abuse of domain trust;
•MSSQL and lateral movement;
•Group policies and lateral movement;
•Privilege Escalation;
•PowerUp;
•UAC Bypass;
•Persistence;
•Startup folder;
•Domain Persistence;
•Mimikatz skeleton key attack;
•DCSync rights using PowerView;
•Domain Controller DSRM admin;
•Changing security descriptors for remote access to WMI;
•Changing security descriptors for PowerShell remote access;
•Modifying DC registry security descriptors for remote hash extraction using DAMP;
•DCShadow;
•Post-exploitation;
•LSASS protection;
•Dump credentials using Mimikatz;
•Abuse of DPAPI by Mimikatz;
•Dumping secrets without Mimikatz;
•Windows Defender evasion;
•Chisel proxying;
•Juicy files.
#AD#ИБ#Hack
